Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 12:57
Static task
static1
Behavioral task
behavioral1
Sample
a20f3a89ecb11c1d39b663cfb3952a15_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a20f3a89ecb11c1d39b663cfb3952a15_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a20f3a89ecb11c1d39b663cfb3952a15_JaffaCakes118.exe
-
Size
196KB
-
MD5
a20f3a89ecb11c1d39b663cfb3952a15
-
SHA1
312200b9fcda7cffe619b091755a8e8836e1d316
-
SHA256
e75f06a0e8dcaece61c01161e59b1f08d93be843045f88d03d6c5a8541e4d9e5
-
SHA512
cbaeaa929c60a5114f3d384731d9f59ca5a3d026b7266cd3ed745c87844dea75193c60fb9b91934a4b516236ba9a02f4bcb5f4cf6d9384b0fc51c0ae63933fd2
-
SSDEEP
6144:9pXAT/y1NPXSdqJ2HGEwTDOc0NbFd9o7717JLWZ:c/y1NPCIom5TDy5di17JL
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 43 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxmbk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation a20f3a89ecb11c1d39b663cfb3952a15_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2652 igfxmbk32.exe -
Executes dropped EXE 43 IoCs
pid Process 2652 igfxmbk32.exe 3052 igfxmbk32.exe 116 igfxmbk32.exe 4020 igfxmbk32.exe 1560 igfxmbk32.exe 456 igfxmbk32.exe 2240 igfxmbk32.exe 4800 igfxmbk32.exe 3856 igfxmbk32.exe 4128 igfxmbk32.exe 4100 igfxmbk32.exe 4088 igfxmbk32.exe 4716 igfxmbk32.exe 3240 igfxmbk32.exe 2016 igfxmbk32.exe 2100 igfxmbk32.exe 4496 igfxmbk32.exe 4312 igfxmbk32.exe 3900 igfxmbk32.exe 4080 igfxmbk32.exe 2372 igfxmbk32.exe 4436 igfxmbk32.exe 4628 igfxmbk32.exe 4840 igfxmbk32.exe 2772 igfxmbk32.exe 396 igfxmbk32.exe 4716 igfxmbk32.exe 4576 igfxmbk32.exe 4736 igfxmbk32.exe 4464 igfxmbk32.exe 2892 igfxmbk32.exe 2300 igfxmbk32.exe 4752 igfxmbk32.exe 4788 igfxmbk32.exe 408 igfxmbk32.exe 4040 igfxmbk32.exe 1744 igfxmbk32.exe 1164 igfxmbk32.exe 524 igfxmbk32.exe 3260 igfxmbk32.exe 180 igfxmbk32.exe 3800 igfxmbk32.exe 3784 igfxmbk32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 a20f3a89ecb11c1d39b663cfb3952a15_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum a20f3a89ecb11c1d39b663cfb3952a15_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmbk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmbk32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\ igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\ igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File created C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File created C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\ igfxmbk32.exe File created C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File created C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File created C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\ igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\ igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\ igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File created C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File created C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\ igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\ igfxmbk32.exe File created C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File created C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File created C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\ igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\ igfxmbk32.exe File created C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\ igfxmbk32.exe File created C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\igfxmbk32.exe a20f3a89ecb11c1d39b663cfb3952a15_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File created C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File created C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\ igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File created C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File created C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File created C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File created C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File created C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\ igfxmbk32.exe File created C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\ igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\ a20f3a89ecb11c1d39b663cfb3952a15_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\ igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\ igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\ igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\ igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File opened for modification C:\Windows\SysWOW64\ igfxmbk32.exe File created C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe File created C:\Windows\SysWOW64\igfxmbk32.exe igfxmbk32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 43 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a20f3a89ecb11c1d39b663cfb3952a15_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmbk32.exe -
Modifies registry class 43 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ a20f3a89ecb11c1d39b663cfb3952a15_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmbk32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4088 a20f3a89ecb11c1d39b663cfb3952a15_JaffaCakes118.exe 4088 a20f3a89ecb11c1d39b663cfb3952a15_JaffaCakes118.exe 2652 igfxmbk32.exe 2652 igfxmbk32.exe 3052 igfxmbk32.exe 3052 igfxmbk32.exe 116 igfxmbk32.exe 116 igfxmbk32.exe 4020 igfxmbk32.exe 4020 igfxmbk32.exe 1560 igfxmbk32.exe 1560 igfxmbk32.exe 456 igfxmbk32.exe 456 igfxmbk32.exe 2240 igfxmbk32.exe 2240 igfxmbk32.exe 4800 igfxmbk32.exe 4800 igfxmbk32.exe 3856 igfxmbk32.exe 3856 igfxmbk32.exe 4128 igfxmbk32.exe 4128 igfxmbk32.exe 4100 igfxmbk32.exe 4100 igfxmbk32.exe 4088 igfxmbk32.exe 4088 igfxmbk32.exe 4716 igfxmbk32.exe 4716 igfxmbk32.exe 3240 igfxmbk32.exe 3240 igfxmbk32.exe 2016 igfxmbk32.exe 2016 igfxmbk32.exe 2100 igfxmbk32.exe 2100 igfxmbk32.exe 4496 igfxmbk32.exe 4496 igfxmbk32.exe 4312 igfxmbk32.exe 4312 igfxmbk32.exe 3900 igfxmbk32.exe 3900 igfxmbk32.exe 4080 igfxmbk32.exe 4080 igfxmbk32.exe 2372 igfxmbk32.exe 2372 igfxmbk32.exe 4436 igfxmbk32.exe 4436 igfxmbk32.exe 4628 igfxmbk32.exe 4628 igfxmbk32.exe 4840 igfxmbk32.exe 4840 igfxmbk32.exe 2772 igfxmbk32.exe 2772 igfxmbk32.exe 396 igfxmbk32.exe 396 igfxmbk32.exe 4716 igfxmbk32.exe 4716 igfxmbk32.exe 4576 igfxmbk32.exe 4576 igfxmbk32.exe 4736 igfxmbk32.exe 4736 igfxmbk32.exe 4464 igfxmbk32.exe 4464 igfxmbk32.exe 2892 igfxmbk32.exe 2892 igfxmbk32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4088 wrote to memory of 2652 4088 a20f3a89ecb11c1d39b663cfb3952a15_JaffaCakes118.exe 81 PID 4088 wrote to memory of 2652 4088 a20f3a89ecb11c1d39b663cfb3952a15_JaffaCakes118.exe 81 PID 4088 wrote to memory of 2652 4088 a20f3a89ecb11c1d39b663cfb3952a15_JaffaCakes118.exe 81 PID 2652 wrote to memory of 3052 2652 igfxmbk32.exe 84 PID 2652 wrote to memory of 3052 2652 igfxmbk32.exe 84 PID 2652 wrote to memory of 3052 2652 igfxmbk32.exe 84 PID 3052 wrote to memory of 116 3052 igfxmbk32.exe 87 PID 3052 wrote to memory of 116 3052 igfxmbk32.exe 87 PID 3052 wrote to memory of 116 3052 igfxmbk32.exe 87 PID 116 wrote to memory of 4020 116 igfxmbk32.exe 89 PID 116 wrote to memory of 4020 116 igfxmbk32.exe 89 PID 116 wrote to memory of 4020 116 igfxmbk32.exe 89 PID 4020 wrote to memory of 1560 4020 igfxmbk32.exe 92 PID 4020 wrote to memory of 1560 4020 igfxmbk32.exe 92 PID 4020 wrote to memory of 1560 4020 igfxmbk32.exe 92 PID 1560 wrote to memory of 456 1560 igfxmbk32.exe 93 PID 1560 wrote to memory of 456 1560 igfxmbk32.exe 93 PID 1560 wrote to memory of 456 1560 igfxmbk32.exe 93 PID 456 wrote to memory of 2240 456 igfxmbk32.exe 94 PID 456 wrote to memory of 2240 456 igfxmbk32.exe 94 PID 456 wrote to memory of 2240 456 igfxmbk32.exe 94 PID 2240 wrote to memory of 4800 2240 igfxmbk32.exe 95 PID 2240 wrote to memory of 4800 2240 igfxmbk32.exe 95 PID 2240 wrote to memory of 4800 2240 igfxmbk32.exe 95 PID 4800 wrote to memory of 3856 4800 igfxmbk32.exe 97 PID 4800 wrote to memory of 3856 4800 igfxmbk32.exe 97 PID 4800 wrote to memory of 3856 4800 igfxmbk32.exe 97 PID 3856 wrote to memory of 4128 3856 igfxmbk32.exe 98 PID 3856 wrote to memory of 4128 3856 igfxmbk32.exe 98 PID 3856 wrote to memory of 4128 3856 igfxmbk32.exe 98 PID 4128 wrote to memory of 4100 4128 igfxmbk32.exe 99 PID 4128 wrote to memory of 4100 4128 igfxmbk32.exe 99 PID 4128 wrote to memory of 4100 4128 igfxmbk32.exe 99 PID 4100 wrote to memory of 4088 4100 igfxmbk32.exe 100 PID 4100 wrote to memory of 4088 4100 igfxmbk32.exe 100 PID 4100 wrote to memory of 4088 4100 igfxmbk32.exe 100 PID 4088 wrote to memory of 4716 4088 igfxmbk32.exe 101 PID 4088 wrote to memory of 4716 4088 igfxmbk32.exe 101 PID 4088 wrote to memory of 4716 4088 igfxmbk32.exe 101 PID 4716 wrote to memory of 3240 4716 igfxmbk32.exe 103 PID 4716 wrote to memory of 3240 4716 igfxmbk32.exe 103 PID 4716 wrote to memory of 3240 4716 igfxmbk32.exe 103 PID 3240 wrote to memory of 2016 3240 igfxmbk32.exe 104 PID 3240 wrote to memory of 2016 3240 igfxmbk32.exe 104 PID 3240 wrote to memory of 2016 3240 igfxmbk32.exe 104 PID 2016 wrote to memory of 2100 2016 igfxmbk32.exe 105 PID 2016 wrote to memory of 2100 2016 igfxmbk32.exe 105 PID 2016 wrote to memory of 2100 2016 igfxmbk32.exe 105 PID 2100 wrote to memory of 4496 2100 igfxmbk32.exe 106 PID 2100 wrote to memory of 4496 2100 igfxmbk32.exe 106 PID 2100 wrote to memory of 4496 2100 igfxmbk32.exe 106 PID 4496 wrote to memory of 4312 4496 igfxmbk32.exe 107 PID 4496 wrote to memory of 4312 4496 igfxmbk32.exe 107 PID 4496 wrote to memory of 4312 4496 igfxmbk32.exe 107 PID 4312 wrote to memory of 3900 4312 igfxmbk32.exe 108 PID 4312 wrote to memory of 3900 4312 igfxmbk32.exe 108 PID 4312 wrote to memory of 3900 4312 igfxmbk32.exe 108 PID 3900 wrote to memory of 4080 3900 igfxmbk32.exe 109 PID 3900 wrote to memory of 4080 3900 igfxmbk32.exe 109 PID 3900 wrote to memory of 4080 3900 igfxmbk32.exe 109 PID 4080 wrote to memory of 2372 4080 igfxmbk32.exe 110 PID 4080 wrote to memory of 2372 4080 igfxmbk32.exe 110 PID 4080 wrote to memory of 2372 4080 igfxmbk32.exe 110 PID 2372 wrote to memory of 4436 2372 igfxmbk32.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\a20f3a89ecb11c1d39b663cfb3952a15_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a20f3a89ecb11c1d39b663cfb3952a15_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Users\Admin\AppData\Local\Temp\A20F3A~1.EXE2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE3⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE5⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE7⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE9⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE11⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE13⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE15⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE17⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE19⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE21⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE23⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4436 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4628 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE25⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4840 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2772 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE27⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:396 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4716 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE29⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4576 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4736 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE31⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4464 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2892 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE33⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2300 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4752 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE35⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4788 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:408 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE37⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4040 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1744 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE39⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1164 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:524 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE41⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3260 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:180 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE43⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3800 -
C:\Windows\SysWOW64\igfxmbk32.exe"C:\Windows\system32\igfxmbk32.exe" C:\Windows\SysWOW64\IGFXMB~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
PID:3784
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD5a20f3a89ecb11c1d39b663cfb3952a15
SHA1312200b9fcda7cffe619b091755a8e8836e1d316
SHA256e75f06a0e8dcaece61c01161e59b1f08d93be843045f88d03d6c5a8541e4d9e5
SHA512cbaeaa929c60a5114f3d384731d9f59ca5a3d026b7266cd3ed745c87844dea75193c60fb9b91934a4b516236ba9a02f4bcb5f4cf6d9384b0fc51c0ae63933fd2