Analysis
-
max time kernel
117s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 12:51
Static task
static1
Behavioral task
behavioral1
Sample
6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe
Resource
win10v2004-20241007-en
General
-
Target
6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe
-
Size
169KB
-
MD5
63b4ce9d1754b302c32a2001349f81f0
-
SHA1
9ecd8f07d8f1fe07b24758b16073e7b5acb9ae37
-
SHA256
6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78
-
SHA512
2f36b8859a7434da6d026c35087b7dbb8f441f76a1c86cebedb63353a8905d9ff7ca23ddae3259a11d96da3dc83fd17b0bc140451cddbfe4053c99c9f140c1ec
-
SSDEEP
3072:B6OqYQ2555kfoTKw3ADWDzj/t5HV/5vY364CFQinHPAk7jI3pQSUK3:WYQKMoTKFuz1/Pe13
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 12 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxwt32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxwt32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxwt32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxwt32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxwt32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxwt32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxwt32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxwt32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxwt32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxwt32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxwt32.exe -
Deletes itself 1 IoCs
pid Process 3768 igfxwt32.exe -
Executes dropped EXE 23 IoCs
pid Process 3028 igfxwt32.exe 3768 igfxwt32.exe 4648 igfxwt32.exe 3468 igfxwt32.exe 3524 igfxwt32.exe 3116 igfxwt32.exe 4232 igfxwt32.exe 1164 igfxwt32.exe 1004 igfxwt32.exe 396 igfxwt32.exe 1556 igfxwt32.exe 3348 igfxwt32.exe 3144 igfxwt32.exe 420 igfxwt32.exe 4448 igfxwt32.exe 3212 igfxwt32.exe 3064 igfxwt32.exe 4856 igfxwt32.exe 4984 igfxwt32.exe 2776 igfxwt32.exe 2928 igfxwt32.exe 2412 igfxwt32.exe 3776 igfxwt32.exe -
Maps connected drives based on registry 3 TTPs 24 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwt32.exe -
Drops file in System32 directory 36 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxwt32.exe igfxwt32.exe File opened for modification C:\Windows\SysWOW64\igfxwt32.exe igfxwt32.exe File opened for modification C:\Windows\SysWOW64\ igfxwt32.exe File opened for modification C:\Windows\SysWOW64\ igfxwt32.exe File opened for modification C:\Windows\SysWOW64\ igfxwt32.exe File opened for modification C:\Windows\SysWOW64\igfxwt32.exe igfxwt32.exe File created C:\Windows\SysWOW64\igfxwt32.exe igfxwt32.exe File created C:\Windows\SysWOW64\igfxwt32.exe igfxwt32.exe File opened for modification C:\Windows\SysWOW64\ igfxwt32.exe File created C:\Windows\SysWOW64\igfxwt32.exe igfxwt32.exe File created C:\Windows\SysWOW64\igfxwt32.exe igfxwt32.exe File opened for modification C:\Windows\SysWOW64\ igfxwt32.exe File opened for modification C:\Windows\SysWOW64\igfxwt32.exe igfxwt32.exe File opened for modification C:\Windows\SysWOW64\igfxwt32.exe igfxwt32.exe File created C:\Windows\SysWOW64\igfxwt32.exe igfxwt32.exe File opened for modification C:\Windows\SysWOW64\igfxwt32.exe igfxwt32.exe File created C:\Windows\SysWOW64\igfxwt32.exe igfxwt32.exe File opened for modification C:\Windows\SysWOW64\ igfxwt32.exe File opened for modification C:\Windows\SysWOW64\ igfxwt32.exe File created C:\Windows\SysWOW64\igfxwt32.exe igfxwt32.exe File created C:\Windows\SysWOW64\igfxwt32.exe igfxwt32.exe File opened for modification C:\Windows\SysWOW64\igfxwt32.exe igfxwt32.exe File opened for modification C:\Windows\SysWOW64\igfxwt32.exe igfxwt32.exe File created C:\Windows\SysWOW64\igfxwt32.exe 6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe File opened for modification C:\Windows\SysWOW64\igfxwt32.exe igfxwt32.exe File opened for modification C:\Windows\SysWOW64\igfxwt32.exe igfxwt32.exe File created C:\Windows\SysWOW64\igfxwt32.exe igfxwt32.exe File opened for modification C:\Windows\SysWOW64\ igfxwt32.exe File opened for modification C:\Windows\SysWOW64\ 6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe File opened for modification C:\Windows\SysWOW64\igfxwt32.exe 6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe File opened for modification C:\Windows\SysWOW64\ igfxwt32.exe File opened for modification C:\Windows\SysWOW64\ igfxwt32.exe File opened for modification C:\Windows\SysWOW64\ igfxwt32.exe File opened for modification C:\Windows\SysWOW64\igfxwt32.exe igfxwt32.exe File created C:\Windows\SysWOW64\igfxwt32.exe igfxwt32.exe File opened for modification C:\Windows\SysWOW64\igfxwt32.exe igfxwt32.exe -
Suspicious use of SetThreadContext 12 IoCs
description pid Process procid_target PID 1120 set thread context of 2636 1120 6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe 86 PID 3028 set thread context of 3768 3028 igfxwt32.exe 91 PID 4648 set thread context of 3468 4648 igfxwt32.exe 93 PID 3524 set thread context of 3116 3524 igfxwt32.exe 96 PID 4232 set thread context of 1164 4232 igfxwt32.exe 99 PID 1004 set thread context of 396 1004 igfxwt32.exe 101 PID 1556 set thread context of 3348 1556 igfxwt32.exe 103 PID 3144 set thread context of 420 3144 igfxwt32.exe 105 PID 4448 set thread context of 3212 4448 igfxwt32.exe 107 PID 3064 set thread context of 4856 3064 igfxwt32.exe 109 PID 4984 set thread context of 2776 4984 igfxwt32.exe 111 PID 2928 set thread context of 2412 2928 igfxwt32.exe 113 -
resource yara_rule behavioral2/memory/2636-0-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/2636-2-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/2636-3-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/2636-4-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/2636-38-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3768-43-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3768-44-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3768-45-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3768-47-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3468-54-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3116-61-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/1164-68-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/396-75-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3348-81-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3348-85-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/420-91-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3212-95-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3212-96-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3212-97-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/4856-105-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/2776-113-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/2412-120-0x0000000000400000-0x0000000000467000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwt32.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwt32.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2636 6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe 2636 6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe 2636 6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe 2636 6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe 3768 igfxwt32.exe 3768 igfxwt32.exe 3768 igfxwt32.exe 3768 igfxwt32.exe 3468 igfxwt32.exe 3468 igfxwt32.exe 3468 igfxwt32.exe 3468 igfxwt32.exe 3116 igfxwt32.exe 3116 igfxwt32.exe 3116 igfxwt32.exe 3116 igfxwt32.exe 1164 igfxwt32.exe 1164 igfxwt32.exe 1164 igfxwt32.exe 1164 igfxwt32.exe 396 igfxwt32.exe 396 igfxwt32.exe 396 igfxwt32.exe 396 igfxwt32.exe 3348 igfxwt32.exe 3348 igfxwt32.exe 3348 igfxwt32.exe 3348 igfxwt32.exe 420 igfxwt32.exe 420 igfxwt32.exe 420 igfxwt32.exe 420 igfxwt32.exe 3212 igfxwt32.exe 3212 igfxwt32.exe 3212 igfxwt32.exe 3212 igfxwt32.exe 4856 igfxwt32.exe 4856 igfxwt32.exe 4856 igfxwt32.exe 4856 igfxwt32.exe 2776 igfxwt32.exe 2776 igfxwt32.exe 2776 igfxwt32.exe 2776 igfxwt32.exe 2412 igfxwt32.exe 2412 igfxwt32.exe 2412 igfxwt32.exe 2412 igfxwt32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1120 wrote to memory of 2636 1120 6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe 86 PID 1120 wrote to memory of 2636 1120 6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe 86 PID 1120 wrote to memory of 2636 1120 6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe 86 PID 1120 wrote to memory of 2636 1120 6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe 86 PID 1120 wrote to memory of 2636 1120 6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe 86 PID 1120 wrote to memory of 2636 1120 6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe 86 PID 1120 wrote to memory of 2636 1120 6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe 86 PID 2636 wrote to memory of 3028 2636 6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe 88 PID 2636 wrote to memory of 3028 2636 6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe 88 PID 2636 wrote to memory of 3028 2636 6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe 88 PID 3028 wrote to memory of 3768 3028 igfxwt32.exe 91 PID 3028 wrote to memory of 3768 3028 igfxwt32.exe 91 PID 3028 wrote to memory of 3768 3028 igfxwt32.exe 91 PID 3028 wrote to memory of 3768 3028 igfxwt32.exe 91 PID 3028 wrote to memory of 3768 3028 igfxwt32.exe 91 PID 3028 wrote to memory of 3768 3028 igfxwt32.exe 91 PID 3028 wrote to memory of 3768 3028 igfxwt32.exe 91 PID 3768 wrote to memory of 4648 3768 igfxwt32.exe 92 PID 3768 wrote to memory of 4648 3768 igfxwt32.exe 92 PID 3768 wrote to memory of 4648 3768 igfxwt32.exe 92 PID 4648 wrote to memory of 3468 4648 igfxwt32.exe 93 PID 4648 wrote to memory of 3468 4648 igfxwt32.exe 93 PID 4648 wrote to memory of 3468 4648 igfxwt32.exe 93 PID 4648 wrote to memory of 3468 4648 igfxwt32.exe 93 PID 4648 wrote to memory of 3468 4648 igfxwt32.exe 93 PID 4648 wrote to memory of 3468 4648 igfxwt32.exe 93 PID 4648 wrote to memory of 3468 4648 igfxwt32.exe 93 PID 3468 wrote to memory of 3524 3468 igfxwt32.exe 95 PID 3468 wrote to memory of 3524 3468 igfxwt32.exe 95 PID 3468 wrote to memory of 3524 3468 igfxwt32.exe 95 PID 3524 wrote to memory of 3116 3524 igfxwt32.exe 96 PID 3524 wrote to memory of 3116 3524 igfxwt32.exe 96 PID 3524 wrote to memory of 3116 3524 igfxwt32.exe 96 PID 3524 wrote to memory of 3116 3524 igfxwt32.exe 96 PID 3524 wrote to memory of 3116 3524 igfxwt32.exe 96 PID 3524 wrote to memory of 3116 3524 igfxwt32.exe 96 PID 3524 wrote to memory of 3116 3524 igfxwt32.exe 96 PID 3116 wrote to memory of 4232 3116 igfxwt32.exe 98 PID 3116 wrote to memory of 4232 3116 igfxwt32.exe 98 PID 3116 wrote to memory of 4232 3116 igfxwt32.exe 98 PID 4232 wrote to memory of 1164 4232 igfxwt32.exe 99 PID 4232 wrote to memory of 1164 4232 igfxwt32.exe 99 PID 4232 wrote to memory of 1164 4232 igfxwt32.exe 99 PID 4232 wrote to memory of 1164 4232 igfxwt32.exe 99 PID 4232 wrote to memory of 1164 4232 igfxwt32.exe 99 PID 4232 wrote to memory of 1164 4232 igfxwt32.exe 99 PID 4232 wrote to memory of 1164 4232 igfxwt32.exe 99 PID 1164 wrote to memory of 1004 1164 igfxwt32.exe 100 PID 1164 wrote to memory of 1004 1164 igfxwt32.exe 100 PID 1164 wrote to memory of 1004 1164 igfxwt32.exe 100 PID 1004 wrote to memory of 396 1004 igfxwt32.exe 101 PID 1004 wrote to memory of 396 1004 igfxwt32.exe 101 PID 1004 wrote to memory of 396 1004 igfxwt32.exe 101 PID 1004 wrote to memory of 396 1004 igfxwt32.exe 101 PID 1004 wrote to memory of 396 1004 igfxwt32.exe 101 PID 1004 wrote to memory of 396 1004 igfxwt32.exe 101 PID 1004 wrote to memory of 396 1004 igfxwt32.exe 101 PID 396 wrote to memory of 1556 396 igfxwt32.exe 102 PID 396 wrote to memory of 1556 396 igfxwt32.exe 102 PID 396 wrote to memory of 1556 396 igfxwt32.exe 102 PID 1556 wrote to memory of 3348 1556 igfxwt32.exe 103 PID 1556 wrote to memory of 3348 1556 igfxwt32.exe 103 PID 1556 wrote to memory of 3348 1556 igfxwt32.exe 103 PID 1556 wrote to memory of 3348 1556 igfxwt32.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe"C:\Users\Admin\AppData\Local\Temp\6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe"C:\Users\Admin\AppData\Local\Temp\6b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\igfxwt32.exe"C:\Windows\system32\igfxwt32.exe" C:\Users\Admin\AppData\Local\Temp\6B05CF~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\igfxwt32.exe"C:\Windows\system32\igfxwt32.exe" C:\Users\Admin\AppData\Local\Temp\6B05CF~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\SysWOW64\igfxwt32.exe"C:\Windows\system32\igfxwt32.exe" C:\Windows\SysWOW64\igfxwt32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\igfxwt32.exe"C:\Windows\system32\igfxwt32.exe" C:\Windows\SysWOW64\igfxwt32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\igfxwt32.exe"C:\Windows\system32\igfxwt32.exe" C:\Windows\SysWOW64\igfxwt32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\igfxwt32.exe"C:\Windows\system32\igfxwt32.exe" C:\Windows\SysWOW64\igfxwt32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\SysWOW64\igfxwt32.exe"C:\Windows\system32\igfxwt32.exe" C:\Windows\SysWOW64\igfxwt32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\igfxwt32.exe"C:\Windows\system32\igfxwt32.exe" C:\Windows\SysWOW64\igfxwt32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\igfxwt32.exe"C:\Windows\system32\igfxwt32.exe" C:\Windows\SysWOW64\igfxwt32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\igfxwt32.exe"C:\Windows\system32\igfxwt32.exe" C:\Windows\SysWOW64\igfxwt32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\igfxwt32.exe"C:\Windows\system32\igfxwt32.exe" C:\Windows\SysWOW64\igfxwt32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\igfxwt32.exe"C:\Windows\system32\igfxwt32.exe" C:\Windows\SysWOW64\igfxwt32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3348 -
C:\Windows\SysWOW64\igfxwt32.exe"C:\Windows\system32\igfxwt32.exe" C:\Windows\SysWOW64\igfxwt32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3144 -
C:\Windows\SysWOW64\igfxwt32.exe"C:\Windows\system32\igfxwt32.exe" C:\Windows\SysWOW64\igfxwt32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:420 -
C:\Windows\SysWOW64\igfxwt32.exe"C:\Windows\system32\igfxwt32.exe" C:\Windows\SysWOW64\igfxwt32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4448 -
C:\Windows\SysWOW64\igfxwt32.exe"C:\Windows\system32\igfxwt32.exe" C:\Windows\SysWOW64\igfxwt32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3212 -
C:\Windows\SysWOW64\igfxwt32.exe"C:\Windows\system32\igfxwt32.exe" C:\Windows\SysWOW64\igfxwt32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3064 -
C:\Windows\SysWOW64\igfxwt32.exe"C:\Windows\system32\igfxwt32.exe" C:\Windows\SysWOW64\igfxwt32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4856 -
C:\Windows\SysWOW64\igfxwt32.exe"C:\Windows\system32\igfxwt32.exe" C:\Windows\SysWOW64\igfxwt32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4984 -
C:\Windows\SysWOW64\igfxwt32.exe"C:\Windows\system32\igfxwt32.exe" C:\Windows\SysWOW64\igfxwt32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2776 -
C:\Windows\SysWOW64\igfxwt32.exe"C:\Windows\system32\igfxwt32.exe" C:\Windows\SysWOW64\igfxwt32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2928 -
C:\Windows\SysWOW64\igfxwt32.exe"C:\Windows\system32\igfxwt32.exe" C:\Windows\SysWOW64\igfxwt32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2412 -
C:\Windows\SysWOW64\igfxwt32.exe"C:\Windows\system32\igfxwt32.exe" C:\Windows\SysWOW64\igfxwt32.exe25⤵
- Executes dropped EXE
PID:3776
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD563b4ce9d1754b302c32a2001349f81f0
SHA19ecd8f07d8f1fe07b24758b16073e7b5acb9ae37
SHA2566b05cf7da2514d6a97dee34137a7689395928adc782eb0a970ee277d03b62e78
SHA5122f36b8859a7434da6d026c35087b7dbb8f441f76a1c86cebedb63353a8905d9ff7ca23ddae3259a11d96da3dc83fd17b0bc140451cddbfe4053c99c9f140c1ec