Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 03:07
Static task
static1
Behavioral task
behavioral1
Sample
98d6614a15ac9caa0ed6a34aef5d3413_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
98d6614a15ac9caa0ed6a34aef5d3413_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
98d6614a15ac9caa0ed6a34aef5d3413_JaffaCakes118.exe
-
Size
263KB
-
MD5
98d6614a15ac9caa0ed6a34aef5d3413
-
SHA1
10a7322ebb2dc861c925bb0e59080010db6a2a12
-
SHA256
f5dd4d40fd0cd780c483507baf299d9dbdafadc5291578cbc572d046eedd2a3f
-
SHA512
baf6accdacafaacd71a501e684442bcbcf0edde2add12323212a7f4ae7155410e7762ced55ff4bc3925c3e2c261337aa1d525cd85fcfe0775431285f26d1ad21
-
SSDEEP
6144:gYrLk/6q04ewUIDWjLNWvYkcSjz0DFhtVbDOsjS/H/Jka1+4:jrsWHNyuSjkt5ysjS/fJkO+
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2124 igfxdfp32.exe -
Executes dropped EXE 49 IoCs
pid Process 2124 igfxdfp32.exe 1056 igfxdfp32.exe 568 igfxdfp32.exe 2428 igfxdfp32.exe 1828 igfxdfp32.exe 2112 igfxdfp32.exe 2348 igfxdfp32.exe 2072 igfxdfp32.exe 2040 igfxdfp32.exe 2632 igfxdfp32.exe 1696 igfxdfp32.exe 652 igfxdfp32.exe 1380 igfxdfp32.exe 2136 igfxdfp32.exe 1356 igfxdfp32.exe 2564 igfxdfp32.exe 2992 igfxdfp32.exe 2928 igfxdfp32.exe 1724 igfxdfp32.exe 1252 igfxdfp32.exe 2588 igfxdfp32.exe 2156 igfxdfp32.exe 2580 igfxdfp32.exe 892 igfxdfp32.exe 2704 igfxdfp32.exe 2668 igfxdfp32.exe 1480 igfxdfp32.exe 1500 igfxdfp32.exe 2128 igfxdfp32.exe 860 igfxdfp32.exe 2916 igfxdfp32.exe 1456 igfxdfp32.exe 2696 igfxdfp32.exe 2244 igfxdfp32.exe 1580 igfxdfp32.exe 2052 igfxdfp32.exe 1544 igfxdfp32.exe 2584 igfxdfp32.exe 1288 igfxdfp32.exe 1380 igfxdfp32.exe 2176 igfxdfp32.exe 1964 igfxdfp32.exe 2076 igfxdfp32.exe 2952 igfxdfp32.exe 1752 igfxdfp32.exe 1196 igfxdfp32.exe 1512 igfxdfp32.exe 2100 igfxdfp32.exe 2460 igfxdfp32.exe -
Loads dropped DLL 64 IoCs
pid Process 3044 98d6614a15ac9caa0ed6a34aef5d3413_JaffaCakes118.exe 3044 98d6614a15ac9caa0ed6a34aef5d3413_JaffaCakes118.exe 2124 igfxdfp32.exe 2124 igfxdfp32.exe 1056 igfxdfp32.exe 1056 igfxdfp32.exe 568 igfxdfp32.exe 568 igfxdfp32.exe 2428 igfxdfp32.exe 2428 igfxdfp32.exe 1828 igfxdfp32.exe 1828 igfxdfp32.exe 2112 igfxdfp32.exe 2112 igfxdfp32.exe 2348 igfxdfp32.exe 2348 igfxdfp32.exe 2072 igfxdfp32.exe 2072 igfxdfp32.exe 2040 igfxdfp32.exe 2040 igfxdfp32.exe 2632 igfxdfp32.exe 2632 igfxdfp32.exe 1696 igfxdfp32.exe 1696 igfxdfp32.exe 652 igfxdfp32.exe 652 igfxdfp32.exe 1380 igfxdfp32.exe 1380 igfxdfp32.exe 2136 igfxdfp32.exe 2136 igfxdfp32.exe 1356 igfxdfp32.exe 1356 igfxdfp32.exe 2564 igfxdfp32.exe 2564 igfxdfp32.exe 2992 igfxdfp32.exe 2992 igfxdfp32.exe 2928 igfxdfp32.exe 2928 igfxdfp32.exe 1724 igfxdfp32.exe 1724 igfxdfp32.exe 1252 igfxdfp32.exe 1252 igfxdfp32.exe 2588 igfxdfp32.exe 2588 igfxdfp32.exe 2156 igfxdfp32.exe 2156 igfxdfp32.exe 2580 igfxdfp32.exe 2580 igfxdfp32.exe 892 igfxdfp32.exe 892 igfxdfp32.exe 2704 igfxdfp32.exe 2704 igfxdfp32.exe 2668 igfxdfp32.exe 2668 igfxdfp32.exe 1480 igfxdfp32.exe 1480 igfxdfp32.exe 1500 igfxdfp32.exe 1500 igfxdfp32.exe 2128 igfxdfp32.exe 2128 igfxdfp32.exe 860 igfxdfp32.exe 860 igfxdfp32.exe 2916 igfxdfp32.exe 2916 igfxdfp32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 98d6614a15ac9caa0ed6a34aef5d3413_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe 98d6614a15ac9caa0ed6a34aef5d3413_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe 98d6614a15ac9caa0ed6a34aef5d3413_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 49 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98d6614a15ac9caa0ed6a34aef5d3413_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe -
Suspicious behavior: EnumeratesProcesses 49 IoCs
pid Process 3044 98d6614a15ac9caa0ed6a34aef5d3413_JaffaCakes118.exe 2124 igfxdfp32.exe 1056 igfxdfp32.exe 568 igfxdfp32.exe 2428 igfxdfp32.exe 1828 igfxdfp32.exe 2112 igfxdfp32.exe 2348 igfxdfp32.exe 2072 igfxdfp32.exe 2040 igfxdfp32.exe 2632 igfxdfp32.exe 1696 igfxdfp32.exe 652 igfxdfp32.exe 1380 igfxdfp32.exe 2136 igfxdfp32.exe 1356 igfxdfp32.exe 2992 igfxdfp32.exe 2928 igfxdfp32.exe 1724 igfxdfp32.exe 1252 igfxdfp32.exe 2588 igfxdfp32.exe 2156 igfxdfp32.exe 2580 igfxdfp32.exe 892 igfxdfp32.exe 2704 igfxdfp32.exe 2668 igfxdfp32.exe 1480 igfxdfp32.exe 1500 igfxdfp32.exe 2128 igfxdfp32.exe 860 igfxdfp32.exe 2916 igfxdfp32.exe 1456 igfxdfp32.exe 2696 igfxdfp32.exe 2244 igfxdfp32.exe 1580 igfxdfp32.exe 2052 igfxdfp32.exe 1544 igfxdfp32.exe 2584 igfxdfp32.exe 1288 igfxdfp32.exe 1380 igfxdfp32.exe 2176 igfxdfp32.exe 1964 igfxdfp32.exe 2076 igfxdfp32.exe 2952 igfxdfp32.exe 1752 igfxdfp32.exe 1196 igfxdfp32.exe 1512 igfxdfp32.exe 2100 igfxdfp32.exe 2460 igfxdfp32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2124 3044 98d6614a15ac9caa0ed6a34aef5d3413_JaffaCakes118.exe 30 PID 3044 wrote to memory of 2124 3044 98d6614a15ac9caa0ed6a34aef5d3413_JaffaCakes118.exe 30 PID 3044 wrote to memory of 2124 3044 98d6614a15ac9caa0ed6a34aef5d3413_JaffaCakes118.exe 30 PID 3044 wrote to memory of 2124 3044 98d6614a15ac9caa0ed6a34aef5d3413_JaffaCakes118.exe 30 PID 2124 wrote to memory of 1056 2124 igfxdfp32.exe 31 PID 2124 wrote to memory of 1056 2124 igfxdfp32.exe 31 PID 2124 wrote to memory of 1056 2124 igfxdfp32.exe 31 PID 2124 wrote to memory of 1056 2124 igfxdfp32.exe 31 PID 1056 wrote to memory of 568 1056 igfxdfp32.exe 32 PID 1056 wrote to memory of 568 1056 igfxdfp32.exe 32 PID 1056 wrote to memory of 568 1056 igfxdfp32.exe 32 PID 1056 wrote to memory of 568 1056 igfxdfp32.exe 32 PID 568 wrote to memory of 2428 568 igfxdfp32.exe 33 PID 568 wrote to memory of 2428 568 igfxdfp32.exe 33 PID 568 wrote to memory of 2428 568 igfxdfp32.exe 33 PID 568 wrote to memory of 2428 568 igfxdfp32.exe 33 PID 2428 wrote to memory of 1828 2428 igfxdfp32.exe 34 PID 2428 wrote to memory of 1828 2428 igfxdfp32.exe 34 PID 2428 wrote to memory of 1828 2428 igfxdfp32.exe 34 PID 2428 wrote to memory of 1828 2428 igfxdfp32.exe 34 PID 1828 wrote to memory of 2112 1828 igfxdfp32.exe 35 PID 1828 wrote to memory of 2112 1828 igfxdfp32.exe 35 PID 1828 wrote to memory of 2112 1828 igfxdfp32.exe 35 PID 1828 wrote to memory of 2112 1828 igfxdfp32.exe 35 PID 2112 wrote to memory of 2348 2112 igfxdfp32.exe 36 PID 2112 wrote to memory of 2348 2112 igfxdfp32.exe 36 PID 2112 wrote to memory of 2348 2112 igfxdfp32.exe 36 PID 2112 wrote to memory of 2348 2112 igfxdfp32.exe 36 PID 2348 wrote to memory of 2072 2348 igfxdfp32.exe 37 PID 2348 wrote to memory of 2072 2348 igfxdfp32.exe 37 PID 2348 wrote to memory of 2072 2348 igfxdfp32.exe 37 PID 2348 wrote to memory of 2072 2348 igfxdfp32.exe 37 PID 2072 wrote to memory of 2040 2072 igfxdfp32.exe 38 PID 2072 wrote to memory of 2040 2072 igfxdfp32.exe 38 PID 2072 wrote to memory of 2040 2072 igfxdfp32.exe 38 PID 2072 wrote to memory of 2040 2072 igfxdfp32.exe 38 PID 2040 wrote to memory of 2632 2040 igfxdfp32.exe 39 PID 2040 wrote to memory of 2632 2040 igfxdfp32.exe 39 PID 2040 wrote to memory of 2632 2040 igfxdfp32.exe 39 PID 2040 wrote to memory of 2632 2040 igfxdfp32.exe 39 PID 2632 wrote to memory of 1696 2632 igfxdfp32.exe 40 PID 2632 wrote to memory of 1696 2632 igfxdfp32.exe 40 PID 2632 wrote to memory of 1696 2632 igfxdfp32.exe 40 PID 2632 wrote to memory of 1696 2632 igfxdfp32.exe 40 PID 1696 wrote to memory of 652 1696 igfxdfp32.exe 41 PID 1696 wrote to memory of 652 1696 igfxdfp32.exe 41 PID 1696 wrote to memory of 652 1696 igfxdfp32.exe 41 PID 1696 wrote to memory of 652 1696 igfxdfp32.exe 41 PID 652 wrote to memory of 1380 652 igfxdfp32.exe 42 PID 652 wrote to memory of 1380 652 igfxdfp32.exe 42 PID 652 wrote to memory of 1380 652 igfxdfp32.exe 42 PID 652 wrote to memory of 1380 652 igfxdfp32.exe 42 PID 1380 wrote to memory of 2136 1380 igfxdfp32.exe 43 PID 1380 wrote to memory of 2136 1380 igfxdfp32.exe 43 PID 1380 wrote to memory of 2136 1380 igfxdfp32.exe 43 PID 1380 wrote to memory of 2136 1380 igfxdfp32.exe 43 PID 2136 wrote to memory of 1356 2136 igfxdfp32.exe 44 PID 2136 wrote to memory of 1356 2136 igfxdfp32.exe 44 PID 2136 wrote to memory of 1356 2136 igfxdfp32.exe 44 PID 2136 wrote to memory of 1356 2136 igfxdfp32.exe 44 PID 1356 wrote to memory of 2564 1356 igfxdfp32.exe 45 PID 1356 wrote to memory of 2564 1356 igfxdfp32.exe 45 PID 1356 wrote to memory of 2564 1356 igfxdfp32.exe 45 PID 1356 wrote to memory of 2564 1356 igfxdfp32.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\98d6614a15ac9caa0ed6a34aef5d3413_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\98d6614a15ac9caa0ed6a34aef5d3413_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Users\Admin\AppData\Local\Temp\98D661~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2564 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2992 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2928 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1724 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1252 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2588 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2156 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2580 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:892 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2704 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2668 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1480 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1500 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2128 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:860 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2916 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1456 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2696 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2244 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1580 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2052 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1544 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE39⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2584 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1288 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1380 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2176 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1964 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2076 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2952 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1752 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1196 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1512 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE49⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2100 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE50⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2460
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD598d6614a15ac9caa0ed6a34aef5d3413
SHA110a7322ebb2dc861c925bb0e59080010db6a2a12
SHA256f5dd4d40fd0cd780c483507baf299d9dbdafadc5291578cbc572d046eedd2a3f
SHA512baf6accdacafaacd71a501e684442bcbcf0edde2add12323212a7f4ae7155410e7762ced55ff4bc3925c3e2c261337aa1d525cd85fcfe0775431285f26d1ad21