Analysis
-
max time kernel
118s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 19:45
Static task
static1
Behavioral task
behavioral1
Sample
36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe
Resource
win10v2004-20241007-en
General
-
Target
36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe
-
Size
172KB
-
MD5
8e6a5d2c1b4aad1715259f4fa34f2100
-
SHA1
d69b077fbaf8df7c3f129a0adc058344fe9bf1ea
-
SHA256
36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3
-
SHA512
9a24afd494dcb4a03ad0638928da5efcc84f83629f2e01582f65a5e5cd9b274664dea2fa555d0c32e75fdb7f8dc3da9247a44b3b5593914641fea020a13fb9e8
-
SSDEEP
3072:oSZh+mB1+HuhQjuyoN+ke4HBFhbag6N72w1Tzsy6Haoa8UAERxkj:rntwqQju9vzW+Kd8Ulq
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 13 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
igfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exe36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exeigfxwl32.exeigfxwl32.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxwl32.exe -
Deletes itself 1 IoCs
Processes:
igfxwl32.exepid Process 3596 igfxwl32.exe -
Executes dropped EXE 25 IoCs
Processes:
igfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exepid Process 216 igfxwl32.exe 3596 igfxwl32.exe 3456 igfxwl32.exe 2640 igfxwl32.exe 2644 igfxwl32.exe 4356 igfxwl32.exe 3908 igfxwl32.exe 2752 igfxwl32.exe 404 igfxwl32.exe 512 igfxwl32.exe 3308 igfxwl32.exe 5084 igfxwl32.exe 4824 igfxwl32.exe 3448 igfxwl32.exe 1828 igfxwl32.exe 1020 igfxwl32.exe 2196 igfxwl32.exe 1568 igfxwl32.exe 2288 igfxwl32.exe 4528 igfxwl32.exe 3456 igfxwl32.exe 620 igfxwl32.exe 3064 igfxwl32.exe 2152 igfxwl32.exe 4524 igfxwl32.exe -
Maps connected drives based on registry 3 TTPs 26 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
igfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exe36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exeigfxwl32.exeigfxwl32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe -
Drops file in System32 directory 39 IoCs
Processes:
igfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exe36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exedescription ioc Process File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe -
Suspicious use of SetThreadContext 13 IoCs
Processes:
36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exedescription pid Process procid_target PID 2256 set thread context of 4604 2256 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe 94 PID 216 set thread context of 3596 216 igfxwl32.exe 102 PID 3456 set thread context of 2640 3456 igfxwl32.exe 104 PID 2644 set thread context of 4356 2644 igfxwl32.exe 109 PID 3908 set thread context of 2752 3908 igfxwl32.exe 111 PID 404 set thread context of 512 404 igfxwl32.exe 113 PID 3308 set thread context of 5084 3308 igfxwl32.exe 115 PID 4824 set thread context of 3448 4824 igfxwl32.exe 118 PID 1828 set thread context of 1020 1828 igfxwl32.exe 120 PID 2196 set thread context of 1568 2196 igfxwl32.exe 122 PID 2288 set thread context of 4528 2288 igfxwl32.exe 124 PID 3456 set thread context of 620 3456 igfxwl32.exe 126 PID 3064 set thread context of 2152 3064 igfxwl32.exe 128 -
Processes:
resource yara_rule behavioral2/memory/4604-1-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4604-4-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4604-5-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4604-6-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4604-43-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3596-50-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3596-52-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2640-61-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4356-69-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2752-79-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/512-88-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/5084-97-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3448-106-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1020-112-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1020-116-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1568-125-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4528-132-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4528-135-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/620-144-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2152-157-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 26 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
igfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exe36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exe36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exeigfxwl32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe -
Modifies registry class 13 IoCs
Processes:
igfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exe36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
Processes:
36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exepid Process 4604 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe 4604 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe 4604 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe 4604 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe 3596 igfxwl32.exe 3596 igfxwl32.exe 3596 igfxwl32.exe 3596 igfxwl32.exe 2640 igfxwl32.exe 2640 igfxwl32.exe 2640 igfxwl32.exe 2640 igfxwl32.exe 4356 igfxwl32.exe 4356 igfxwl32.exe 4356 igfxwl32.exe 4356 igfxwl32.exe 2752 igfxwl32.exe 2752 igfxwl32.exe 2752 igfxwl32.exe 2752 igfxwl32.exe 512 igfxwl32.exe 512 igfxwl32.exe 512 igfxwl32.exe 512 igfxwl32.exe 5084 igfxwl32.exe 5084 igfxwl32.exe 5084 igfxwl32.exe 5084 igfxwl32.exe 3448 igfxwl32.exe 3448 igfxwl32.exe 3448 igfxwl32.exe 3448 igfxwl32.exe 1020 igfxwl32.exe 1020 igfxwl32.exe 1020 igfxwl32.exe 1020 igfxwl32.exe 1568 igfxwl32.exe 1568 igfxwl32.exe 1568 igfxwl32.exe 1568 igfxwl32.exe 4528 igfxwl32.exe 4528 igfxwl32.exe 4528 igfxwl32.exe 4528 igfxwl32.exe 620 igfxwl32.exe 620 igfxwl32.exe 620 igfxwl32.exe 620 igfxwl32.exe 2152 igfxwl32.exe 2152 igfxwl32.exe 2152 igfxwl32.exe 2152 igfxwl32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exeigfxwl32.exedescription pid Process procid_target PID 2256 wrote to memory of 4604 2256 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe 94 PID 2256 wrote to memory of 4604 2256 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe 94 PID 2256 wrote to memory of 4604 2256 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe 94 PID 2256 wrote to memory of 4604 2256 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe 94 PID 2256 wrote to memory of 4604 2256 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe 94 PID 2256 wrote to memory of 4604 2256 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe 94 PID 2256 wrote to memory of 4604 2256 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe 94 PID 4604 wrote to memory of 216 4604 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe 97 PID 4604 wrote to memory of 216 4604 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe 97 PID 4604 wrote to memory of 216 4604 36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe 97 PID 216 wrote to memory of 3596 216 igfxwl32.exe 102 PID 216 wrote to memory of 3596 216 igfxwl32.exe 102 PID 216 wrote to memory of 3596 216 igfxwl32.exe 102 PID 216 wrote to memory of 3596 216 igfxwl32.exe 102 PID 216 wrote to memory of 3596 216 igfxwl32.exe 102 PID 216 wrote to memory of 3596 216 igfxwl32.exe 102 PID 216 wrote to memory of 3596 216 igfxwl32.exe 102 PID 3596 wrote to memory of 3456 3596 igfxwl32.exe 103 PID 3596 wrote to memory of 3456 3596 igfxwl32.exe 103 PID 3596 wrote to memory of 3456 3596 igfxwl32.exe 103 PID 3456 wrote to memory of 2640 3456 igfxwl32.exe 104 PID 3456 wrote to memory of 2640 3456 igfxwl32.exe 104 PID 3456 wrote to memory of 2640 3456 igfxwl32.exe 104 PID 3456 wrote to memory of 2640 3456 igfxwl32.exe 104 PID 3456 wrote to memory of 2640 3456 igfxwl32.exe 104 PID 3456 wrote to memory of 2640 3456 igfxwl32.exe 104 PID 3456 wrote to memory of 2640 3456 igfxwl32.exe 104 PID 2640 wrote to memory of 2644 2640 igfxwl32.exe 105 PID 2640 wrote to memory of 2644 2640 igfxwl32.exe 105 PID 2640 wrote to memory of 2644 2640 igfxwl32.exe 105 PID 2644 wrote to memory of 4356 2644 igfxwl32.exe 109 PID 2644 wrote to memory of 4356 2644 igfxwl32.exe 109 PID 2644 wrote to memory of 4356 2644 igfxwl32.exe 109 PID 2644 wrote to memory of 4356 2644 igfxwl32.exe 109 PID 2644 wrote to memory of 4356 2644 igfxwl32.exe 109 PID 2644 wrote to memory of 4356 2644 igfxwl32.exe 109 PID 2644 wrote to memory of 4356 2644 igfxwl32.exe 109 PID 4356 wrote to memory of 3908 4356 igfxwl32.exe 110 PID 4356 wrote to memory of 3908 4356 igfxwl32.exe 110 PID 4356 wrote to memory of 3908 4356 igfxwl32.exe 110 PID 3908 wrote to memory of 2752 3908 igfxwl32.exe 111 PID 3908 wrote to memory of 2752 3908 igfxwl32.exe 111 PID 3908 wrote to memory of 2752 3908 igfxwl32.exe 111 PID 3908 wrote to memory of 2752 3908 igfxwl32.exe 111 PID 3908 wrote to memory of 2752 3908 igfxwl32.exe 111 PID 3908 wrote to memory of 2752 3908 igfxwl32.exe 111 PID 3908 wrote to memory of 2752 3908 igfxwl32.exe 111 PID 2752 wrote to memory of 404 2752 igfxwl32.exe 112 PID 2752 wrote to memory of 404 2752 igfxwl32.exe 112 PID 2752 wrote to memory of 404 2752 igfxwl32.exe 112 PID 404 wrote to memory of 512 404 igfxwl32.exe 113 PID 404 wrote to memory of 512 404 igfxwl32.exe 113 PID 404 wrote to memory of 512 404 igfxwl32.exe 113 PID 404 wrote to memory of 512 404 igfxwl32.exe 113 PID 404 wrote to memory of 512 404 igfxwl32.exe 113 PID 404 wrote to memory of 512 404 igfxwl32.exe 113 PID 404 wrote to memory of 512 404 igfxwl32.exe 113 PID 512 wrote to memory of 3308 512 igfxwl32.exe 114 PID 512 wrote to memory of 3308 512 igfxwl32.exe 114 PID 512 wrote to memory of 3308 512 igfxwl32.exe 114 PID 3308 wrote to memory of 5084 3308 igfxwl32.exe 115 PID 3308 wrote to memory of 5084 3308 igfxwl32.exe 115 PID 3308 wrote to memory of 5084 3308 igfxwl32.exe 115 PID 3308 wrote to memory of 5084 3308 igfxwl32.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe"C:\Users\Admin\AppData\Local\Temp\36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe"C:\Users\Admin\AppData\Local\Temp\36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3N.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Users\Admin\AppData\Local\Temp\36D4B1~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Users\Admin\AppData\Local\Temp\36D4B1~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5084 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4824 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3448 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1828 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1020 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2196 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1568 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2288 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4528 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3456 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:620 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3064 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2152 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe27⤵
- Executes dropped EXE
PID:4524
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD58e6a5d2c1b4aad1715259f4fa34f2100
SHA1d69b077fbaf8df7c3f129a0adc058344fe9bf1ea
SHA25636d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3
SHA5129a24afd494dcb4a03ad0638928da5efcc84f83629f2e01582f65a5e5cd9b274664dea2fa555d0c32e75fdb7f8dc3da9247a44b3b5593914641fea020a13fb9e8
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e