Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 13:30
Static task
static1
Behavioral task
behavioral1
Sample
a235ef9f79049efb592352b935ba325a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a235ef9f79049efb592352b935ba325a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a235ef9f79049efb592352b935ba325a_JaffaCakes118.exe
-
Size
796KB
-
MD5
a235ef9f79049efb592352b935ba325a
-
SHA1
639052ce77c57626483ed18b256705545d9984dd
-
SHA256
04a17c7216a19cc38926b4d49b4de0e42b23ca46eb5877c1e95682b85cb4f9da
-
SHA512
66e2ba3d35fd878012785725b9f668d45b876ae154537502dce0bf8d40eda948d4a0b40094f210bc426dc302109acecc6ac3c1e54721be8eac22db6f863e9f83
-
SSDEEP
12288:4EJO7K9kgW7DZPH9dbHCSUlSKDOra2SJkltJpiyMAPBlTxC+Q0E9XS:4EX9lmDZPHeSpaOoJgXpiyMElgv9X
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2472 igfxdrh32.exe -
Executes dropped EXE 54 IoCs
pid Process 2472 igfxdrh32.exe 2808 igfxdrh32.exe 2564 igfxdrh32.exe 2704 igfxdrh32.exe 2652 igfxdrh32.exe 1084 igfxdrh32.exe 1620 igfxdrh32.exe 2000 igfxdrh32.exe 1060 igfxdrh32.exe 2912 igfxdrh32.exe 2004 igfxdrh32.exe 944 igfxdrh32.exe 2424 igfxdrh32.exe 3032 igfxdrh32.exe 1752 igfxdrh32.exe 752 igfxdrh32.exe 292 igfxdrh32.exe 1316 igfxdrh32.exe 1600 igfxdrh32.exe 2316 igfxdrh32.exe 2720 igfxdrh32.exe 2656 igfxdrh32.exe 2736 igfxdrh32.exe 2868 igfxdrh32.exe 2568 igfxdrh32.exe 2548 igfxdrh32.exe 2152 igfxdrh32.exe 2748 igfxdrh32.exe 1860 igfxdrh32.exe 2752 igfxdrh32.exe 1176 igfxdrh32.exe 2928 igfxdrh32.exe 2628 igfxdrh32.exe 2492 igfxdrh32.exe 1480 igfxdrh32.exe 2016 igfxdrh32.exe 2120 igfxdrh32.exe 2024 igfxdrh32.exe 1320 igfxdrh32.exe 3024 igfxdrh32.exe 2488 igfxdrh32.exe 1560 igfxdrh32.exe 2460 igfxdrh32.exe 2448 igfxdrh32.exe 772 igfxdrh32.exe 1976 igfxdrh32.exe 340 igfxdrh32.exe 2816 igfxdrh32.exe 908 igfxdrh32.exe 2204 igfxdrh32.exe 2808 igfxdrh32.exe 2728 igfxdrh32.exe 2624 igfxdrh32.exe 2524 igfxdrh32.exe -
Loads dropped DLL 64 IoCs
pid Process 2412 a235ef9f79049efb592352b935ba325a_JaffaCakes118.exe 2412 a235ef9f79049efb592352b935ba325a_JaffaCakes118.exe 2472 igfxdrh32.exe 2472 igfxdrh32.exe 2808 igfxdrh32.exe 2808 igfxdrh32.exe 2564 igfxdrh32.exe 2564 igfxdrh32.exe 2704 igfxdrh32.exe 2704 igfxdrh32.exe 2652 igfxdrh32.exe 2652 igfxdrh32.exe 1084 igfxdrh32.exe 1084 igfxdrh32.exe 1620 igfxdrh32.exe 1620 igfxdrh32.exe 2000 igfxdrh32.exe 2000 igfxdrh32.exe 1060 igfxdrh32.exe 1060 igfxdrh32.exe 2912 igfxdrh32.exe 2912 igfxdrh32.exe 2004 igfxdrh32.exe 2004 igfxdrh32.exe 944 igfxdrh32.exe 944 igfxdrh32.exe 2424 igfxdrh32.exe 2424 igfxdrh32.exe 3032 igfxdrh32.exe 3032 igfxdrh32.exe 1752 igfxdrh32.exe 1752 igfxdrh32.exe 752 igfxdrh32.exe 752 igfxdrh32.exe 292 igfxdrh32.exe 292 igfxdrh32.exe 1316 igfxdrh32.exe 1316 igfxdrh32.exe 1600 igfxdrh32.exe 1600 igfxdrh32.exe 2316 igfxdrh32.exe 2316 igfxdrh32.exe 2720 igfxdrh32.exe 2720 igfxdrh32.exe 2656 igfxdrh32.exe 2656 igfxdrh32.exe 2736 igfxdrh32.exe 2736 igfxdrh32.exe 2868 igfxdrh32.exe 2868 igfxdrh32.exe 2568 igfxdrh32.exe 2568 igfxdrh32.exe 2548 igfxdrh32.exe 2548 igfxdrh32.exe 2152 igfxdrh32.exe 2152 igfxdrh32.exe 2748 igfxdrh32.exe 2748 igfxdrh32.exe 1860 igfxdrh32.exe 1860 igfxdrh32.exe 2752 igfxdrh32.exe 2752 igfxdrh32.exe 1176 igfxdrh32.exe 1176 igfxdrh32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdrh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdrh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdrh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdrh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdrh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 a235ef9f79049efb592352b935ba325a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdrh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdrh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdrh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdrh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrh32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File created C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File created C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File created C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrh32.exe File created C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File created C:\Windows\SysWOW64\igfxdrh32.exe a235ef9f79049efb592352b935ba325a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrh32.exe File created C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File created C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrh32.exe File created C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrh32.exe File created C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File created C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File created C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File created C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File created C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File created C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File created C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrh32.exe File created C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File created C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File created C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File created C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File created C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File created C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File created C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File created C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrh32.exe File opened for modification C:\Windows\SysWOW64\igfxdrh32.exe igfxdrh32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 54 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a235ef9f79049efb592352b935ba325a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrh32.exe -
Suspicious behavior: EnumeratesProcesses 55 IoCs
pid Process 2412 a235ef9f79049efb592352b935ba325a_JaffaCakes118.exe 2472 igfxdrh32.exe 2808 igfxdrh32.exe 2564 igfxdrh32.exe 2704 igfxdrh32.exe 2652 igfxdrh32.exe 1084 igfxdrh32.exe 1620 igfxdrh32.exe 2000 igfxdrh32.exe 1060 igfxdrh32.exe 2912 igfxdrh32.exe 2004 igfxdrh32.exe 944 igfxdrh32.exe 2424 igfxdrh32.exe 3032 igfxdrh32.exe 1752 igfxdrh32.exe 752 igfxdrh32.exe 292 igfxdrh32.exe 1316 igfxdrh32.exe 1600 igfxdrh32.exe 2316 igfxdrh32.exe 2720 igfxdrh32.exe 2656 igfxdrh32.exe 2736 igfxdrh32.exe 2868 igfxdrh32.exe 2568 igfxdrh32.exe 2548 igfxdrh32.exe 2152 igfxdrh32.exe 2748 igfxdrh32.exe 1860 igfxdrh32.exe 2752 igfxdrh32.exe 1176 igfxdrh32.exe 2928 igfxdrh32.exe 2628 igfxdrh32.exe 2492 igfxdrh32.exe 1480 igfxdrh32.exe 2016 igfxdrh32.exe 2120 igfxdrh32.exe 2024 igfxdrh32.exe 1320 igfxdrh32.exe 3024 igfxdrh32.exe 2488 igfxdrh32.exe 1560 igfxdrh32.exe 2460 igfxdrh32.exe 2448 igfxdrh32.exe 772 igfxdrh32.exe 1976 igfxdrh32.exe 340 igfxdrh32.exe 2816 igfxdrh32.exe 908 igfxdrh32.exe 2204 igfxdrh32.exe 2808 igfxdrh32.exe 2728 igfxdrh32.exe 2624 igfxdrh32.exe 2524 igfxdrh32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2472 2412 a235ef9f79049efb592352b935ba325a_JaffaCakes118.exe 31 PID 2412 wrote to memory of 2472 2412 a235ef9f79049efb592352b935ba325a_JaffaCakes118.exe 31 PID 2412 wrote to memory of 2472 2412 a235ef9f79049efb592352b935ba325a_JaffaCakes118.exe 31 PID 2412 wrote to memory of 2472 2412 a235ef9f79049efb592352b935ba325a_JaffaCakes118.exe 31 PID 2472 wrote to memory of 2808 2472 igfxdrh32.exe 32 PID 2472 wrote to memory of 2808 2472 igfxdrh32.exe 32 PID 2472 wrote to memory of 2808 2472 igfxdrh32.exe 32 PID 2472 wrote to memory of 2808 2472 igfxdrh32.exe 32 PID 2808 wrote to memory of 2564 2808 igfxdrh32.exe 33 PID 2808 wrote to memory of 2564 2808 igfxdrh32.exe 33 PID 2808 wrote to memory of 2564 2808 igfxdrh32.exe 33 PID 2808 wrote to memory of 2564 2808 igfxdrh32.exe 33 PID 2564 wrote to memory of 2704 2564 igfxdrh32.exe 34 PID 2564 wrote to memory of 2704 2564 igfxdrh32.exe 34 PID 2564 wrote to memory of 2704 2564 igfxdrh32.exe 34 PID 2564 wrote to memory of 2704 2564 igfxdrh32.exe 34 PID 2704 wrote to memory of 2652 2704 igfxdrh32.exe 35 PID 2704 wrote to memory of 2652 2704 igfxdrh32.exe 35 PID 2704 wrote to memory of 2652 2704 igfxdrh32.exe 35 PID 2704 wrote to memory of 2652 2704 igfxdrh32.exe 35 PID 2652 wrote to memory of 1084 2652 igfxdrh32.exe 36 PID 2652 wrote to memory of 1084 2652 igfxdrh32.exe 36 PID 2652 wrote to memory of 1084 2652 igfxdrh32.exe 36 PID 2652 wrote to memory of 1084 2652 igfxdrh32.exe 36 PID 1084 wrote to memory of 1620 1084 igfxdrh32.exe 37 PID 1084 wrote to memory of 1620 1084 igfxdrh32.exe 37 PID 1084 wrote to memory of 1620 1084 igfxdrh32.exe 37 PID 1084 wrote to memory of 1620 1084 igfxdrh32.exe 37 PID 1620 wrote to memory of 2000 1620 igfxdrh32.exe 38 PID 1620 wrote to memory of 2000 1620 igfxdrh32.exe 38 PID 1620 wrote to memory of 2000 1620 igfxdrh32.exe 38 PID 1620 wrote to memory of 2000 1620 igfxdrh32.exe 38 PID 2000 wrote to memory of 1060 2000 igfxdrh32.exe 39 PID 2000 wrote to memory of 1060 2000 igfxdrh32.exe 39 PID 2000 wrote to memory of 1060 2000 igfxdrh32.exe 39 PID 2000 wrote to memory of 1060 2000 igfxdrh32.exe 39 PID 1060 wrote to memory of 2912 1060 igfxdrh32.exe 40 PID 1060 wrote to memory of 2912 1060 igfxdrh32.exe 40 PID 1060 wrote to memory of 2912 1060 igfxdrh32.exe 40 PID 1060 wrote to memory of 2912 1060 igfxdrh32.exe 40 PID 2912 wrote to memory of 2004 2912 igfxdrh32.exe 41 PID 2912 wrote to memory of 2004 2912 igfxdrh32.exe 41 PID 2912 wrote to memory of 2004 2912 igfxdrh32.exe 41 PID 2912 wrote to memory of 2004 2912 igfxdrh32.exe 41 PID 2004 wrote to memory of 944 2004 igfxdrh32.exe 42 PID 2004 wrote to memory of 944 2004 igfxdrh32.exe 42 PID 2004 wrote to memory of 944 2004 igfxdrh32.exe 42 PID 2004 wrote to memory of 944 2004 igfxdrh32.exe 42 PID 944 wrote to memory of 2424 944 igfxdrh32.exe 43 PID 944 wrote to memory of 2424 944 igfxdrh32.exe 43 PID 944 wrote to memory of 2424 944 igfxdrh32.exe 43 PID 944 wrote to memory of 2424 944 igfxdrh32.exe 43 PID 2424 wrote to memory of 3032 2424 igfxdrh32.exe 44 PID 2424 wrote to memory of 3032 2424 igfxdrh32.exe 44 PID 2424 wrote to memory of 3032 2424 igfxdrh32.exe 44 PID 2424 wrote to memory of 3032 2424 igfxdrh32.exe 44 PID 3032 wrote to memory of 1752 3032 igfxdrh32.exe 45 PID 3032 wrote to memory of 1752 3032 igfxdrh32.exe 45 PID 3032 wrote to memory of 1752 3032 igfxdrh32.exe 45 PID 3032 wrote to memory of 1752 3032 igfxdrh32.exe 45 PID 1752 wrote to memory of 752 1752 igfxdrh32.exe 46 PID 1752 wrote to memory of 752 1752 igfxdrh32.exe 46 PID 1752 wrote to memory of 752 1752 igfxdrh32.exe 46 PID 1752 wrote to memory of 752 1752 igfxdrh32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\a235ef9f79049efb592352b935ba325a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a235ef9f79049efb592352b935ba325a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Users\Admin\AppData\Local\Temp\A235EF~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:752 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:292 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1316 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1600 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2316 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2720 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2656 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2736 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2868 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2568 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2548 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2152 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2748 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1860 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2752 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1176 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2928 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2628 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2492 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1480 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2016 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2120 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2024 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1320 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3024 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE42⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2488 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1560 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2460 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2448 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:772 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1976 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:340 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE49⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2816 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE50⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:908 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE51⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2204 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE52⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2808 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE53⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2728 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE54⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2624 -
C:\Windows\SysWOW64\igfxdrh32.exe"C:\Windows\system32\igfxdrh32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE55⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
796KB
MD5a235ef9f79049efb592352b935ba325a
SHA1639052ce77c57626483ed18b256705545d9984dd
SHA25604a17c7216a19cc38926b4d49b4de0e42b23ca46eb5877c1e95682b85cb4f9da
SHA51266e2ba3d35fd878012785725b9f668d45b876ae154537502dce0bf8d40eda948d4a0b40094f210bc426dc302109acecc6ac3c1e54721be8eac22db6f863e9f83