Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 02:17
Static task
static1
Behavioral task
behavioral1
Sample
9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe
-
Size
246KB
-
MD5
9f442fbd0d524ace9f540c38751d7c2e
-
SHA1
fc0a7dc9421d8817c47d0c279d2b11801f95733a
-
SHA256
15340ef62f68faa89580da965333eade30a56dd50ec961089801e3e56ab7c333
-
SHA512
0ca1c52eb1fb0532456354c7fd2a8b6e2cb90276c5e61d211be1d37cb21a1ee1613f6e0bfeac8562b9ef2d1ed27cf01b2c761d3d779e259a562a13b2c23ad9b5
-
SSDEEP
6144:LqRWEzuXcpYMtVLq47Sduit/QX9gvw0IgXn:+R3zuX0VORtYNgIOXn
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 3052 igfxdct32.exe -
Executes dropped EXE 47 IoCs
pid Process 3052 igfxdct32.exe 2888 igfxdct32.exe 2904 igfxdct32.exe 2688 igfxdct32.exe 1492 igfxdct32.exe 2812 igfxdct32.exe 1656 igfxdct32.exe 2972 igfxdct32.exe 2468 igfxdct32.exe 2376 igfxdct32.exe 904 igfxdct32.exe 628 igfxdct32.exe 1340 igfxdct32.exe 888 igfxdct32.exe 2560 igfxdct32.exe 2276 igfxdct32.exe 1308 igfxdct32.exe 2944 igfxdct32.exe 2348 igfxdct32.exe 2740 igfxdct32.exe 2892 igfxdct32.exe 2612 igfxdct32.exe 2396 igfxdct32.exe 2680 igfxdct32.exe 1104 igfxdct32.exe 2852 igfxdct32.exe 2940 igfxdct32.exe 1368 igfxdct32.exe 2980 igfxdct32.exe 2228 igfxdct32.exe 2400 igfxdct32.exe 1624 igfxdct32.exe 2344 igfxdct32.exe 2056 igfxdct32.exe 344 igfxdct32.exe 2104 igfxdct32.exe 2296 igfxdct32.exe 1916 igfxdct32.exe 1136 igfxdct32.exe 1732 igfxdct32.exe 2736 igfxdct32.exe 2880 igfxdct32.exe 3060 igfxdct32.exe 2308 igfxdct32.exe 2480 igfxdct32.exe 2908 igfxdct32.exe 1084 igfxdct32.exe -
Loads dropped DLL 64 IoCs
pid Process 1908 9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe 1908 9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe 3052 igfxdct32.exe 3052 igfxdct32.exe 2888 igfxdct32.exe 2888 igfxdct32.exe 2904 igfxdct32.exe 2904 igfxdct32.exe 2688 igfxdct32.exe 2688 igfxdct32.exe 1492 igfxdct32.exe 1492 igfxdct32.exe 2812 igfxdct32.exe 2812 igfxdct32.exe 1656 igfxdct32.exe 1656 igfxdct32.exe 2972 igfxdct32.exe 2972 igfxdct32.exe 2468 igfxdct32.exe 2468 igfxdct32.exe 2376 igfxdct32.exe 2376 igfxdct32.exe 904 igfxdct32.exe 904 igfxdct32.exe 628 igfxdct32.exe 628 igfxdct32.exe 1340 igfxdct32.exe 1340 igfxdct32.exe 888 igfxdct32.exe 888 igfxdct32.exe 2560 igfxdct32.exe 2560 igfxdct32.exe 2276 igfxdct32.exe 2276 igfxdct32.exe 1308 igfxdct32.exe 1308 igfxdct32.exe 2944 igfxdct32.exe 2944 igfxdct32.exe 2348 igfxdct32.exe 2348 igfxdct32.exe 2740 igfxdct32.exe 2740 igfxdct32.exe 2892 igfxdct32.exe 2892 igfxdct32.exe 2612 igfxdct32.exe 2612 igfxdct32.exe 2396 igfxdct32.exe 2396 igfxdct32.exe 2680 igfxdct32.exe 2680 igfxdct32.exe 1104 igfxdct32.exe 1104 igfxdct32.exe 2852 igfxdct32.exe 2852 igfxdct32.exe 2940 igfxdct32.exe 2940 igfxdct32.exe 1368 igfxdct32.exe 1368 igfxdct32.exe 2980 igfxdct32.exe 2980 igfxdct32.exe 2228 igfxdct32.exe 2228 igfxdct32.exe 2400 igfxdct32.exe 2400 igfxdct32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ 9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe 9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 48 IoCs
pid Process 1908 9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe 3052 igfxdct32.exe 2888 igfxdct32.exe 2904 igfxdct32.exe 2688 igfxdct32.exe 1492 igfxdct32.exe 2812 igfxdct32.exe 1656 igfxdct32.exe 2972 igfxdct32.exe 2468 igfxdct32.exe 2376 igfxdct32.exe 904 igfxdct32.exe 628 igfxdct32.exe 1340 igfxdct32.exe 888 igfxdct32.exe 2560 igfxdct32.exe 2276 igfxdct32.exe 1308 igfxdct32.exe 2944 igfxdct32.exe 2348 igfxdct32.exe 2740 igfxdct32.exe 2892 igfxdct32.exe 2612 igfxdct32.exe 2396 igfxdct32.exe 2680 igfxdct32.exe 1104 igfxdct32.exe 2852 igfxdct32.exe 2940 igfxdct32.exe 1368 igfxdct32.exe 2980 igfxdct32.exe 2228 igfxdct32.exe 2400 igfxdct32.exe 1624 igfxdct32.exe 2344 igfxdct32.exe 2056 igfxdct32.exe 344 igfxdct32.exe 2104 igfxdct32.exe 2296 igfxdct32.exe 1916 igfxdct32.exe 1136 igfxdct32.exe 1732 igfxdct32.exe 2736 igfxdct32.exe 2880 igfxdct32.exe 3060 igfxdct32.exe 2308 igfxdct32.exe 2480 igfxdct32.exe 2908 igfxdct32.exe 1084 igfxdct32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 47 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1908 9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe 1908 9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe 1908 9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe 1908 9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe 1908 9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe 1908 9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe 1908 9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe 1908 9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe 1908 9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe 1908 9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe 1908 9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe 1908 9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe 1908 9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe 1908 9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe 1908 9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe 1908 9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe 3052 igfxdct32.exe 3052 igfxdct32.exe 3052 igfxdct32.exe 3052 igfxdct32.exe 3052 igfxdct32.exe 3052 igfxdct32.exe 3052 igfxdct32.exe 3052 igfxdct32.exe 3052 igfxdct32.exe 3052 igfxdct32.exe 3052 igfxdct32.exe 3052 igfxdct32.exe 3052 igfxdct32.exe 3052 igfxdct32.exe 3052 igfxdct32.exe 3052 igfxdct32.exe 2888 igfxdct32.exe 2888 igfxdct32.exe 2888 igfxdct32.exe 2888 igfxdct32.exe 2888 igfxdct32.exe 2888 igfxdct32.exe 2888 igfxdct32.exe 2888 igfxdct32.exe 2888 igfxdct32.exe 2888 igfxdct32.exe 2888 igfxdct32.exe 2888 igfxdct32.exe 2888 igfxdct32.exe 2888 igfxdct32.exe 2888 igfxdct32.exe 2888 igfxdct32.exe 2904 igfxdct32.exe 2904 igfxdct32.exe 2904 igfxdct32.exe 2904 igfxdct32.exe 2904 igfxdct32.exe 2904 igfxdct32.exe 2904 igfxdct32.exe 2904 igfxdct32.exe 2904 igfxdct32.exe 2904 igfxdct32.exe 2904 igfxdct32.exe 2904 igfxdct32.exe 2904 igfxdct32.exe 2904 igfxdct32.exe 2904 igfxdct32.exe 2904 igfxdct32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1908 wrote to memory of 3052 1908 9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe 30 PID 1908 wrote to memory of 3052 1908 9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe 30 PID 1908 wrote to memory of 3052 1908 9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe 30 PID 1908 wrote to memory of 3052 1908 9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe 30 PID 3052 wrote to memory of 2888 3052 igfxdct32.exe 31 PID 3052 wrote to memory of 2888 3052 igfxdct32.exe 31 PID 3052 wrote to memory of 2888 3052 igfxdct32.exe 31 PID 3052 wrote to memory of 2888 3052 igfxdct32.exe 31 PID 2888 wrote to memory of 2904 2888 igfxdct32.exe 32 PID 2888 wrote to memory of 2904 2888 igfxdct32.exe 32 PID 2888 wrote to memory of 2904 2888 igfxdct32.exe 32 PID 2888 wrote to memory of 2904 2888 igfxdct32.exe 32 PID 2904 wrote to memory of 2688 2904 igfxdct32.exe 34 PID 2904 wrote to memory of 2688 2904 igfxdct32.exe 34 PID 2904 wrote to memory of 2688 2904 igfxdct32.exe 34 PID 2904 wrote to memory of 2688 2904 igfxdct32.exe 34 PID 2688 wrote to memory of 1492 2688 igfxdct32.exe 35 PID 2688 wrote to memory of 1492 2688 igfxdct32.exe 35 PID 2688 wrote to memory of 1492 2688 igfxdct32.exe 35 PID 2688 wrote to memory of 1492 2688 igfxdct32.exe 35 PID 1492 wrote to memory of 2812 1492 igfxdct32.exe 36 PID 1492 wrote to memory of 2812 1492 igfxdct32.exe 36 PID 1492 wrote to memory of 2812 1492 igfxdct32.exe 36 PID 1492 wrote to memory of 2812 1492 igfxdct32.exe 36 PID 2812 wrote to memory of 1656 2812 igfxdct32.exe 37 PID 2812 wrote to memory of 1656 2812 igfxdct32.exe 37 PID 2812 wrote to memory of 1656 2812 igfxdct32.exe 37 PID 2812 wrote to memory of 1656 2812 igfxdct32.exe 37 PID 1656 wrote to memory of 2972 1656 igfxdct32.exe 38 PID 1656 wrote to memory of 2972 1656 igfxdct32.exe 38 PID 1656 wrote to memory of 2972 1656 igfxdct32.exe 38 PID 1656 wrote to memory of 2972 1656 igfxdct32.exe 38 PID 2972 wrote to memory of 2468 2972 igfxdct32.exe 39 PID 2972 wrote to memory of 2468 2972 igfxdct32.exe 39 PID 2972 wrote to memory of 2468 2972 igfxdct32.exe 39 PID 2972 wrote to memory of 2468 2972 igfxdct32.exe 39 PID 2468 wrote to memory of 2376 2468 igfxdct32.exe 40 PID 2468 wrote to memory of 2376 2468 igfxdct32.exe 40 PID 2468 wrote to memory of 2376 2468 igfxdct32.exe 40 PID 2468 wrote to memory of 2376 2468 igfxdct32.exe 40 PID 2376 wrote to memory of 904 2376 igfxdct32.exe 41 PID 2376 wrote to memory of 904 2376 igfxdct32.exe 41 PID 2376 wrote to memory of 904 2376 igfxdct32.exe 41 PID 2376 wrote to memory of 904 2376 igfxdct32.exe 41 PID 904 wrote to memory of 628 904 igfxdct32.exe 42 PID 904 wrote to memory of 628 904 igfxdct32.exe 42 PID 904 wrote to memory of 628 904 igfxdct32.exe 42 PID 904 wrote to memory of 628 904 igfxdct32.exe 42 PID 628 wrote to memory of 1340 628 igfxdct32.exe 43 PID 628 wrote to memory of 1340 628 igfxdct32.exe 43 PID 628 wrote to memory of 1340 628 igfxdct32.exe 43 PID 628 wrote to memory of 1340 628 igfxdct32.exe 43 PID 1340 wrote to memory of 888 1340 igfxdct32.exe 44 PID 1340 wrote to memory of 888 1340 igfxdct32.exe 44 PID 1340 wrote to memory of 888 1340 igfxdct32.exe 44 PID 1340 wrote to memory of 888 1340 igfxdct32.exe 44 PID 888 wrote to memory of 2560 888 igfxdct32.exe 45 PID 888 wrote to memory of 2560 888 igfxdct32.exe 45 PID 888 wrote to memory of 2560 888 igfxdct32.exe 45 PID 888 wrote to memory of 2560 888 igfxdct32.exe 45 PID 2560 wrote to memory of 2276 2560 igfxdct32.exe 46 PID 2560 wrote to memory of 2276 2560 igfxdct32.exe 46 PID 2560 wrote to memory of 2276 2560 igfxdct32.exe 46 PID 2560 wrote to memory of 2276 2560 igfxdct32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Users\Admin\AppData\Local\Temp\9F442F~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2276 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1308 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2944 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2348 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2740 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2892 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2612 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2396 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2680 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1104 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2852 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2940 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1368 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2980 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2228 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2400 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1624 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2344 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2056 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:344 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2104 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2296 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1916 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1136 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1732 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2736 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2880 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3060 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2308 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2480 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2908 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE48⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1084
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
246KB
MD59f442fbd0d524ace9f540c38751d7c2e
SHA1fc0a7dc9421d8817c47d0c279d2b11801f95733a
SHA25615340ef62f68faa89580da965333eade30a56dd50ec961089801e3e56ab7c333
SHA5120ca1c52eb1fb0532456354c7fd2a8b6e2cb90276c5e61d211be1d37cb21a1ee1613f6e0bfeac8562b9ef2d1ed27cf01b2c761d3d779e259a562a13b2c23ad9b5