Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 05:35
Static task
static1
Behavioral task
behavioral1
Sample
8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe
-
Size
230KB
-
MD5
8f69bf18abeb7f6df4399ea9442b81ac
-
SHA1
ad3d2573709166484167deca2275305c345a573d
-
SHA256
1a36a167bda88e4d6fc041f1485aa6052faad870fc0d4969c6c4df40d023c053
-
SHA512
4a879875cd543f59d87ff12593eaef8a157b3b87ccb394e9a620aac84b5d784746e9bf2304a9824538f92781411fd4a99e75370fe9268ba49131e9212dad7361
-
SSDEEP
6144:0JHxEXVvbwEnJl8hB0TTfQLc41dS62os5a7rK2Y96b:WHx6FbtJWhuTqjS8YaXK2Ykb
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 43 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxdpc32.exe -
Deletes itself 1 IoCs
pid Process 2264 igfxdpc32.exe -
Executes dropped EXE 43 IoCs
pid Process 2264 igfxdpc32.exe 2912 igfxdpc32.exe 3568 igfxdpc32.exe 4380 igfxdpc32.exe 4300 igfxdpc32.exe 228 igfxdpc32.exe 4888 igfxdpc32.exe 764 igfxdpc32.exe 728 igfxdpc32.exe 5072 igfxdpc32.exe 4688 igfxdpc32.exe 4728 igfxdpc32.exe 3776 igfxdpc32.exe 3156 igfxdpc32.exe 1388 igfxdpc32.exe 840 igfxdpc32.exe 2452 igfxdpc32.exe 3652 igfxdpc32.exe 3656 igfxdpc32.exe 3000 igfxdpc32.exe 4808 igfxdpc32.exe 1884 igfxdpc32.exe 4868 igfxdpc32.exe 2260 igfxdpc32.exe 4156 igfxdpc32.exe 3532 igfxdpc32.exe 1044 igfxdpc32.exe 1256 igfxdpc32.exe 2708 igfxdpc32.exe 4624 igfxdpc32.exe 3760 igfxdpc32.exe 5004 igfxdpc32.exe 3000 igfxdpc32.exe 624 igfxdpc32.exe 5108 igfxdpc32.exe 2392 igfxdpc32.exe 2404 igfxdpc32.exe 4460 igfxdpc32.exe 2872 igfxdpc32.exe 3412 igfxdpc32.exe 1272 igfxdpc32.exe 4524 igfxdpc32.exe 2704 igfxdpc32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 43 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe -
Modifies registry class 43 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe 2264 igfxdpc32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 464 wrote to memory of 2264 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 91 PID 464 wrote to memory of 2264 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 91 PID 464 wrote to memory of 2264 464 8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe 91 PID 2264 wrote to memory of 2912 2264 igfxdpc32.exe 94 PID 2264 wrote to memory of 2912 2264 igfxdpc32.exe 94 PID 2264 wrote to memory of 2912 2264 igfxdpc32.exe 94 PID 2912 wrote to memory of 3568 2912 igfxdpc32.exe 96 PID 2912 wrote to memory of 3568 2912 igfxdpc32.exe 96 PID 2912 wrote to memory of 3568 2912 igfxdpc32.exe 96 PID 3568 wrote to memory of 4380 3568 igfxdpc32.exe 99 PID 3568 wrote to memory of 4380 3568 igfxdpc32.exe 99 PID 3568 wrote to memory of 4380 3568 igfxdpc32.exe 99 PID 4380 wrote to memory of 4300 4380 igfxdpc32.exe 100 PID 4380 wrote to memory of 4300 4380 igfxdpc32.exe 100 PID 4380 wrote to memory of 4300 4380 igfxdpc32.exe 100 PID 4300 wrote to memory of 228 4300 igfxdpc32.exe 101 PID 4300 wrote to memory of 228 4300 igfxdpc32.exe 101 PID 4300 wrote to memory of 228 4300 igfxdpc32.exe 101 PID 228 wrote to memory of 4888 228 igfxdpc32.exe 102 PID 228 wrote to memory of 4888 228 igfxdpc32.exe 102 PID 228 wrote to memory of 4888 228 igfxdpc32.exe 102 PID 4888 wrote to memory of 764 4888 igfxdpc32.exe 103 PID 4888 wrote to memory of 764 4888 igfxdpc32.exe 103 PID 4888 wrote to memory of 764 4888 igfxdpc32.exe 103 PID 764 wrote to memory of 728 764 igfxdpc32.exe 105 PID 764 wrote to memory of 728 764 igfxdpc32.exe 105 PID 764 wrote to memory of 728 764 igfxdpc32.exe 105 PID 728 wrote to memory of 5072 728 igfxdpc32.exe 107 PID 728 wrote to memory of 5072 728 igfxdpc32.exe 107 PID 728 wrote to memory of 5072 728 igfxdpc32.exe 107 PID 5072 wrote to memory of 4688 5072 igfxdpc32.exe 109 PID 5072 wrote to memory of 4688 5072 igfxdpc32.exe 109 PID 5072 wrote to memory of 4688 5072 igfxdpc32.exe 109 PID 4688 wrote to memory of 4728 4688 igfxdpc32.exe 110 PID 4688 wrote to memory of 4728 4688 igfxdpc32.exe 110 PID 4688 wrote to memory of 4728 4688 igfxdpc32.exe 110 PID 4728 wrote to memory of 3776 4728 igfxdpc32.exe 111 PID 4728 wrote to memory of 3776 4728 igfxdpc32.exe 111 PID 4728 wrote to memory of 3776 4728 igfxdpc32.exe 111 PID 3776 wrote to memory of 3156 3776 igfxdpc32.exe 112 PID 3776 wrote to memory of 3156 3776 igfxdpc32.exe 112 PID 3776 wrote to memory of 3156 3776 igfxdpc32.exe 112 PID 3156 wrote to memory of 1388 3156 igfxdpc32.exe 113 PID 3156 wrote to memory of 1388 3156 igfxdpc32.exe 113 PID 3156 wrote to memory of 1388 3156 igfxdpc32.exe 113 PID 1388 wrote to memory of 840 1388 igfxdpc32.exe 114 PID 1388 wrote to memory of 840 1388 igfxdpc32.exe 114 PID 1388 wrote to memory of 840 1388 igfxdpc32.exe 114 PID 840 wrote to memory of 2452 840 igfxdpc32.exe 115 PID 840 wrote to memory of 2452 840 igfxdpc32.exe 115 PID 840 wrote to memory of 2452 840 igfxdpc32.exe 115 PID 2452 wrote to memory of 3652 2452 igfxdpc32.exe 116 PID 2452 wrote to memory of 3652 2452 igfxdpc32.exe 116 PID 2452 wrote to memory of 3652 2452 igfxdpc32.exe 116 PID 3652 wrote to memory of 3656 3652 igfxdpc32.exe 117 PID 3652 wrote to memory of 3656 3652 igfxdpc32.exe 117 PID 3652 wrote to memory of 3656 3652 igfxdpc32.exe 117 PID 3656 wrote to memory of 3000 3656 igfxdpc32.exe 119 PID 3656 wrote to memory of 3000 3656 igfxdpc32.exe 119 PID 3656 wrote to memory of 3000 3656 igfxdpc32.exe 119 PID 3000 wrote to memory of 4808 3000 igfxdpc32.exe 120 PID 3000 wrote to memory of 4808 3000 igfxdpc32.exe 120 PID 3000 wrote to memory of 4808 3000 igfxdpc32.exe 120 PID 4808 wrote to memory of 1884 4808 igfxdpc32.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Users\Admin\AppData\Local\Temp\8F69BF~1.EXE2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE3⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE5⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE7⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE9⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE11⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE13⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE15⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE17⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE19⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE21⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE23⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1884 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4868 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE25⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2260 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4156 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE27⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3532 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1044 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE29⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1256 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2708 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE31⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4624 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3760 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE33⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5004 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3000 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE35⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:624 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5108 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE37⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2392 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2404 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE39⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4460 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2872 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE41⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3412 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1272 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE43⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4524 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
PID:2704
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230KB
MD58f69bf18abeb7f6df4399ea9442b81ac
SHA1ad3d2573709166484167deca2275305c345a573d
SHA2561a36a167bda88e4d6fc041f1485aa6052faad870fc0d4969c6c4df40d023c053
SHA5124a879875cd543f59d87ff12593eaef8a157b3b87ccb394e9a620aac84b5d784746e9bf2304a9824538f92781411fd4a99e75370fe9268ba49131e9212dad7361