Analysis
-
max time kernel
118s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-11-2024 19:45
Static task
static1
Behavioral task
behavioral1
Sample
36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe
Resource
win10v2004-20241007-en
General
-
Target
36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe
-
Size
172KB
-
MD5
8e6a5d2c1b4aad1715259f4fa34f2100
-
SHA1
d69b077fbaf8df7c3f129a0adc058344fe9bf1ea
-
SHA256
36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3
-
SHA512
9a24afd494dcb4a03ad0638928da5efcc84f83629f2e01582f65a5e5cd9b274664dea2fa555d0c32e75fdb7f8dc3da9247a44b3b5593914641fea020a13fb9e8
-
SSDEEP
3072:oSZh+mB1+HuhQjuyoN+ke4HBFhbag6N72w1Tzsy6Haoa8UAERxkj:rntwqQju9vzW+Kd8Ulq
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
Processes:
igfxwl32.exepid Process 2700 igfxwl32.exe -
Executes dropped EXE 27 IoCs
Processes:
igfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exepid Process 2816 igfxwl32.exe 2700 igfxwl32.exe 2080 igfxwl32.exe 2412 igfxwl32.exe 2916 igfxwl32.exe 1396 igfxwl32.exe 2932 igfxwl32.exe 264 igfxwl32.exe 1724 igfxwl32.exe 2160 igfxwl32.exe 2768 igfxwl32.exe 1376 igfxwl32.exe 1728 igfxwl32.exe 1560 igfxwl32.exe 996 igfxwl32.exe 2468 igfxwl32.exe 892 igfxwl32.exe 1444 igfxwl32.exe 2848 igfxwl32.exe 2408 igfxwl32.exe 2392 igfxwl32.exe 2552 igfxwl32.exe 2016 igfxwl32.exe 1756 igfxwl32.exe 2928 igfxwl32.exe 2912 igfxwl32.exe 1764 igfxwl32.exe -
Loads dropped DLL 27 IoCs
Processes:
36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exepid Process 352 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe 2816 igfxwl32.exe 2700 igfxwl32.exe 2080 igfxwl32.exe 2412 igfxwl32.exe 2916 igfxwl32.exe 1396 igfxwl32.exe 2932 igfxwl32.exe 264 igfxwl32.exe 1724 igfxwl32.exe 2160 igfxwl32.exe 2768 igfxwl32.exe 1376 igfxwl32.exe 1728 igfxwl32.exe 1560 igfxwl32.exe 996 igfxwl32.exe 2468 igfxwl32.exe 892 igfxwl32.exe 1444 igfxwl32.exe 2848 igfxwl32.exe 2408 igfxwl32.exe 2392 igfxwl32.exe 2552 igfxwl32.exe 2016 igfxwl32.exe 1756 igfxwl32.exe 2928 igfxwl32.exe 2912 igfxwl32.exe -
Maps connected drives based on registry 3 TTPs 28 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
igfxwl32.exeigfxwl32.exeigfxwl32.exe36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe -
Drops file in System32 directory 42 IoCs
Processes:
igfxwl32.exeigfxwl32.exeigfxwl32.exe36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exedescription ioc Process File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe -
Suspicious use of SetThreadContext 14 IoCs
Processes:
36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exedescription pid Process procid_target PID 2344 set thread context of 352 2344 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe 30 PID 2816 set thread context of 2700 2816 igfxwl32.exe 32 PID 2080 set thread context of 2412 2080 igfxwl32.exe 34 PID 2916 set thread context of 1396 2916 igfxwl32.exe 36 PID 2932 set thread context of 264 2932 igfxwl32.exe 38 PID 1724 set thread context of 2160 1724 igfxwl32.exe 40 PID 2768 set thread context of 1376 2768 igfxwl32.exe 42 PID 1728 set thread context of 1560 1728 igfxwl32.exe 44 PID 996 set thread context of 2468 996 igfxwl32.exe 46 PID 892 set thread context of 1444 892 igfxwl32.exe 49 PID 2848 set thread context of 2408 2848 igfxwl32.exe 51 PID 2392 set thread context of 2552 2392 igfxwl32.exe 53 PID 2016 set thread context of 1756 2016 igfxwl32.exe 55 PID 2928 set thread context of 2912 2928 igfxwl32.exe 57 -
Processes:
resource yara_rule behavioral1/memory/352-10-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/352-9-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/352-6-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/352-5-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/352-4-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/352-11-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/352-12-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/352-22-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2700-34-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2700-33-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2700-35-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2700-36-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2700-41-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2412-54-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2412-60-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1396-72-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1396-80-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/264-94-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/264-93-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/264-95-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/264-99-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2160-112-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2160-119-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1376-137-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1728-149-0x0000000000230000-0x0000000000265000-memory.dmp upx behavioral1/memory/1560-156-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2468-168-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2468-174-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1444-187-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1444-193-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2408-209-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2408-214-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2392-216-0x0000000000230000-0x0000000000265000-memory.dmp upx behavioral1/memory/2552-226-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2552-234-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2552-230-0x0000000002FE0000-0x0000000003015000-memory.dmp upx behavioral1/memory/1756-251-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2912-263-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2912-270-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 28 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
igfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exe36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exe36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exepid Process 352 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe 352 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe 2700 igfxwl32.exe 2700 igfxwl32.exe 2412 igfxwl32.exe 2412 igfxwl32.exe 1396 igfxwl32.exe 1396 igfxwl32.exe 264 igfxwl32.exe 264 igfxwl32.exe 2160 igfxwl32.exe 2160 igfxwl32.exe 1376 igfxwl32.exe 1376 igfxwl32.exe 1560 igfxwl32.exe 1560 igfxwl32.exe 2468 igfxwl32.exe 2468 igfxwl32.exe 1444 igfxwl32.exe 1444 igfxwl32.exe 2408 igfxwl32.exe 2408 igfxwl32.exe 2552 igfxwl32.exe 2552 igfxwl32.exe 1756 igfxwl32.exe 1756 igfxwl32.exe 2912 igfxwl32.exe 2912 igfxwl32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exedescription pid Process procid_target PID 2344 wrote to memory of 352 2344 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe 30 PID 2344 wrote to memory of 352 2344 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe 30 PID 2344 wrote to memory of 352 2344 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe 30 PID 2344 wrote to memory of 352 2344 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe 30 PID 2344 wrote to memory of 352 2344 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe 30 PID 2344 wrote to memory of 352 2344 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe 30 PID 2344 wrote to memory of 352 2344 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe 30 PID 352 wrote to memory of 2816 352 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe 31 PID 352 wrote to memory of 2816 352 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe 31 PID 352 wrote to memory of 2816 352 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe 31 PID 352 wrote to memory of 2816 352 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe 31 PID 2816 wrote to memory of 2700 2816 igfxwl32.exe 32 PID 2816 wrote to memory of 2700 2816 igfxwl32.exe 32 PID 2816 wrote to memory of 2700 2816 igfxwl32.exe 32 PID 2816 wrote to memory of 2700 2816 igfxwl32.exe 32 PID 2816 wrote to memory of 2700 2816 igfxwl32.exe 32 PID 2816 wrote to memory of 2700 2816 igfxwl32.exe 32 PID 2816 wrote to memory of 2700 2816 igfxwl32.exe 32 PID 2700 wrote to memory of 2080 2700 igfxwl32.exe 33 PID 2700 wrote to memory of 2080 2700 igfxwl32.exe 33 PID 2700 wrote to memory of 2080 2700 igfxwl32.exe 33 PID 2700 wrote to memory of 2080 2700 igfxwl32.exe 33 PID 2080 wrote to memory of 2412 2080 igfxwl32.exe 34 PID 2080 wrote to memory of 2412 2080 igfxwl32.exe 34 PID 2080 wrote to memory of 2412 2080 igfxwl32.exe 34 PID 2080 wrote to memory of 2412 2080 igfxwl32.exe 34 PID 2080 wrote to memory of 2412 2080 igfxwl32.exe 34 PID 2080 wrote to memory of 2412 2080 igfxwl32.exe 34 PID 2080 wrote to memory of 2412 2080 igfxwl32.exe 34 PID 2412 wrote to memory of 2916 2412 igfxwl32.exe 35 PID 2412 wrote to memory of 2916 2412 igfxwl32.exe 35 PID 2412 wrote to memory of 2916 2412 igfxwl32.exe 35 PID 2412 wrote to memory of 2916 2412 igfxwl32.exe 35 PID 2916 wrote to memory of 1396 2916 igfxwl32.exe 36 PID 2916 wrote to memory of 1396 2916 igfxwl32.exe 36 PID 2916 wrote to memory of 1396 2916 igfxwl32.exe 36 PID 2916 wrote to memory of 1396 2916 igfxwl32.exe 36 PID 2916 wrote to memory of 1396 2916 igfxwl32.exe 36 PID 2916 wrote to memory of 1396 2916 igfxwl32.exe 36 PID 2916 wrote to memory of 1396 2916 igfxwl32.exe 36 PID 1396 wrote to memory of 2932 1396 igfxwl32.exe 37 PID 1396 wrote to memory of 2932 1396 igfxwl32.exe 37 PID 1396 wrote to memory of 2932 1396 igfxwl32.exe 37 PID 1396 wrote to memory of 2932 1396 igfxwl32.exe 37 PID 2932 wrote to memory of 264 2932 igfxwl32.exe 38 PID 2932 wrote to memory of 264 2932 igfxwl32.exe 38 PID 2932 wrote to memory of 264 2932 igfxwl32.exe 38 PID 2932 wrote to memory of 264 2932 igfxwl32.exe 38 PID 2932 wrote to memory of 264 2932 igfxwl32.exe 38 PID 2932 wrote to memory of 264 2932 igfxwl32.exe 38 PID 2932 wrote to memory of 264 2932 igfxwl32.exe 38 PID 264 wrote to memory of 1724 264 igfxwl32.exe 39 PID 264 wrote to memory of 1724 264 igfxwl32.exe 39 PID 264 wrote to memory of 1724 264 igfxwl32.exe 39 PID 264 wrote to memory of 1724 264 igfxwl32.exe 39 PID 1724 wrote to memory of 2160 1724 igfxwl32.exe 40 PID 1724 wrote to memory of 2160 1724 igfxwl32.exe 40 PID 1724 wrote to memory of 2160 1724 igfxwl32.exe 40 PID 1724 wrote to memory of 2160 1724 igfxwl32.exe 40 PID 1724 wrote to memory of 2160 1724 igfxwl32.exe 40 PID 1724 wrote to memory of 2160 1724 igfxwl32.exe 40 PID 1724 wrote to memory of 2160 1724 igfxwl32.exe 40 PID 2160 wrote to memory of 2768 2160 igfxwl32.exe 41 PID 2160 wrote to memory of 2768 2160 igfxwl32.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe"C:\Users\Admin\AppData\Local\Temp\36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe"C:\Users\Admin\AppData\Local\Temp\36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Users\Admin\AppData\Local\Temp\36D4B1~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Users\Admin\AppData\Local\Temp\36D4B1~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2768 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1376 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1728 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1560 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:996 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2468 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:892 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1444 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2848 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2408 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2392 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2552 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2016 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1756 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2928 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2912 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe29⤵
- Executes dropped EXE
PID:1764
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
172KB
MD58e6a5d2c1b4aad1715259f4fa34f2100
SHA1d69b077fbaf8df7c3f129a0adc058344fe9bf1ea
SHA25636d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3
SHA5129a24afd494dcb4a03ad0638928da5efcc84f83629f2e01582f65a5e5cd9b274664dea2fa555d0c32e75fdb7f8dc3da9247a44b3b5593914641fea020a13fb9e8