Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 11:27
Static task
static1
Behavioral task
behavioral1
Sample
ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe
-
Size
213KB
-
MD5
ac293ddbb97a9b4eeb02fb756f740140
-
SHA1
b091334fba1b5466540b513bd458d6bc8dfecf4a
-
SHA256
1ec01f3b93491952e6f0bc3a94cc752a251de60991e4b4fdbe2a7d607122d393
-
SHA512
2029c3515241d136df0d0a13735f28ecfc6890f03edd0d35cc67df676a6234d3500d334d8971760c9201bbe40fa3e52fcc38d69e7882b791eb03412ec954f83a
-
SSDEEP
6144:AwRxlIAXOs5iHw4MSmz6fWnCyyFGhYTZqXcXoEy:h6iiQdSPfWkFTX4
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2540 igfxdpb32.exe -
Executes dropped EXE 49 IoCs
pid Process 2540 igfxdpb32.exe 2656 igfxdpb32.exe 2420 igfxdpb32.exe 2976 igfxdpb32.exe 2796 igfxdpb32.exe 2620 igfxdpb32.exe 2772 igfxdpb32.exe 272 igfxdpb32.exe 2224 igfxdpb32.exe 2236 igfxdpb32.exe 2152 igfxdpb32.exe 2448 igfxdpb32.exe 1700 igfxdpb32.exe 1920 igfxdpb32.exe 2424 igfxdpb32.exe 2968 igfxdpb32.exe 904 igfxdpb32.exe 2860 igfxdpb32.exe 2560 igfxdpb32.exe 2640 igfxdpb32.exe 2564 igfxdpb32.exe 1872 igfxdpb32.exe 2988 igfxdpb32.exe 2076 igfxdpb32.exe 2348 igfxdpb32.exe 484 igfxdpb32.exe 2520 igfxdpb32.exe 988 igfxdpb32.exe 272 igfxdpb32.exe 1292 igfxdpb32.exe 2180 igfxdpb32.exe 268 igfxdpb32.exe 1260 igfxdpb32.exe 1664 igfxdpb32.exe 2032 igfxdpb32.exe 2244 igfxdpb32.exe 2056 igfxdpb32.exe 1480 igfxdpb32.exe 2024 igfxdpb32.exe 952 igfxdpb32.exe 2100 igfxdpb32.exe 2596 igfxdpb32.exe 1716 igfxdpb32.exe 1076 igfxdpb32.exe 1472 igfxdpb32.exe 2648 igfxdpb32.exe 604 igfxdpb32.exe 1660 igfxdpb32.exe 1656 igfxdpb32.exe -
Loads dropped DLL 64 IoCs
pid Process 2664 ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe 2664 ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe 2540 igfxdpb32.exe 2540 igfxdpb32.exe 2656 igfxdpb32.exe 2656 igfxdpb32.exe 2420 igfxdpb32.exe 2420 igfxdpb32.exe 2976 igfxdpb32.exe 2976 igfxdpb32.exe 2796 igfxdpb32.exe 2796 igfxdpb32.exe 2620 igfxdpb32.exe 2620 igfxdpb32.exe 2772 igfxdpb32.exe 2772 igfxdpb32.exe 272 igfxdpb32.exe 272 igfxdpb32.exe 2224 igfxdpb32.exe 2224 igfxdpb32.exe 2236 igfxdpb32.exe 2236 igfxdpb32.exe 2152 igfxdpb32.exe 2152 igfxdpb32.exe 2448 igfxdpb32.exe 2448 igfxdpb32.exe 1700 igfxdpb32.exe 1700 igfxdpb32.exe 1920 igfxdpb32.exe 1920 igfxdpb32.exe 2424 igfxdpb32.exe 2424 igfxdpb32.exe 2968 igfxdpb32.exe 2968 igfxdpb32.exe 904 igfxdpb32.exe 904 igfxdpb32.exe 2860 igfxdpb32.exe 2860 igfxdpb32.exe 2560 igfxdpb32.exe 2560 igfxdpb32.exe 2640 igfxdpb32.exe 2640 igfxdpb32.exe 2564 igfxdpb32.exe 2564 igfxdpb32.exe 1872 igfxdpb32.exe 1872 igfxdpb32.exe 2988 igfxdpb32.exe 2988 igfxdpb32.exe 2076 igfxdpb32.exe 2076 igfxdpb32.exe 2348 igfxdpb32.exe 2348 igfxdpb32.exe 484 igfxdpb32.exe 484 igfxdpb32.exe 2520 igfxdpb32.exe 2520 igfxdpb32.exe 988 igfxdpb32.exe 988 igfxdpb32.exe 272 igfxdpb32.exe 272 igfxdpb32.exe 1292 igfxdpb32.exe 1292 igfxdpb32.exe 2180 igfxdpb32.exe 2180 igfxdpb32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpb32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 49 IoCs
pid Process 2664 ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe 2540 igfxdpb32.exe 2656 igfxdpb32.exe 2420 igfxdpb32.exe 2976 igfxdpb32.exe 2796 igfxdpb32.exe 2620 igfxdpb32.exe 2772 igfxdpb32.exe 272 igfxdpb32.exe 2224 igfxdpb32.exe 2236 igfxdpb32.exe 2152 igfxdpb32.exe 2448 igfxdpb32.exe 1700 igfxdpb32.exe 1920 igfxdpb32.exe 2424 igfxdpb32.exe 2968 igfxdpb32.exe 904 igfxdpb32.exe 2860 igfxdpb32.exe 2560 igfxdpb32.exe 2640 igfxdpb32.exe 2564 igfxdpb32.exe 1872 igfxdpb32.exe 2988 igfxdpb32.exe 2076 igfxdpb32.exe 2348 igfxdpb32.exe 484 igfxdpb32.exe 2520 igfxdpb32.exe 988 igfxdpb32.exe 272 igfxdpb32.exe 1292 igfxdpb32.exe 2180 igfxdpb32.exe 268 igfxdpb32.exe 1260 igfxdpb32.exe 1664 igfxdpb32.exe 2032 igfxdpb32.exe 2244 igfxdpb32.exe 2056 igfxdpb32.exe 2024 igfxdpb32.exe 952 igfxdpb32.exe 2100 igfxdpb32.exe 2596 igfxdpb32.exe 1716 igfxdpb32.exe 1076 igfxdpb32.exe 1472 igfxdpb32.exe 2648 igfxdpb32.exe 604 igfxdpb32.exe 1660 igfxdpb32.exe 1656 igfxdpb32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 49 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe -
Suspicious behavior: EnumeratesProcesses 49 IoCs
pid Process 2664 ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe 2540 igfxdpb32.exe 2656 igfxdpb32.exe 2420 igfxdpb32.exe 2976 igfxdpb32.exe 2796 igfxdpb32.exe 2620 igfxdpb32.exe 2772 igfxdpb32.exe 272 igfxdpb32.exe 2224 igfxdpb32.exe 2236 igfxdpb32.exe 2152 igfxdpb32.exe 2448 igfxdpb32.exe 1700 igfxdpb32.exe 1920 igfxdpb32.exe 2424 igfxdpb32.exe 2968 igfxdpb32.exe 904 igfxdpb32.exe 2860 igfxdpb32.exe 2560 igfxdpb32.exe 2640 igfxdpb32.exe 2564 igfxdpb32.exe 1872 igfxdpb32.exe 2988 igfxdpb32.exe 2076 igfxdpb32.exe 2348 igfxdpb32.exe 484 igfxdpb32.exe 2520 igfxdpb32.exe 988 igfxdpb32.exe 272 igfxdpb32.exe 1292 igfxdpb32.exe 2180 igfxdpb32.exe 268 igfxdpb32.exe 1260 igfxdpb32.exe 1664 igfxdpb32.exe 2032 igfxdpb32.exe 2244 igfxdpb32.exe 2056 igfxdpb32.exe 2024 igfxdpb32.exe 952 igfxdpb32.exe 2100 igfxdpb32.exe 2596 igfxdpb32.exe 1716 igfxdpb32.exe 1076 igfxdpb32.exe 1472 igfxdpb32.exe 2648 igfxdpb32.exe 604 igfxdpb32.exe 1660 igfxdpb32.exe 1656 igfxdpb32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2540 2664 ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe 31 PID 2664 wrote to memory of 2540 2664 ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe 31 PID 2664 wrote to memory of 2540 2664 ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe 31 PID 2664 wrote to memory of 2540 2664 ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe 31 PID 2540 wrote to memory of 2656 2540 igfxdpb32.exe 32 PID 2540 wrote to memory of 2656 2540 igfxdpb32.exe 32 PID 2540 wrote to memory of 2656 2540 igfxdpb32.exe 32 PID 2540 wrote to memory of 2656 2540 igfxdpb32.exe 32 PID 2656 wrote to memory of 2420 2656 igfxdpb32.exe 33 PID 2656 wrote to memory of 2420 2656 igfxdpb32.exe 33 PID 2656 wrote to memory of 2420 2656 igfxdpb32.exe 33 PID 2656 wrote to memory of 2420 2656 igfxdpb32.exe 33 PID 2420 wrote to memory of 2976 2420 igfxdpb32.exe 34 PID 2420 wrote to memory of 2976 2420 igfxdpb32.exe 34 PID 2420 wrote to memory of 2976 2420 igfxdpb32.exe 34 PID 2420 wrote to memory of 2976 2420 igfxdpb32.exe 34 PID 2976 wrote to memory of 2796 2976 igfxdpb32.exe 35 PID 2976 wrote to memory of 2796 2976 igfxdpb32.exe 35 PID 2976 wrote to memory of 2796 2976 igfxdpb32.exe 35 PID 2976 wrote to memory of 2796 2976 igfxdpb32.exe 35 PID 2796 wrote to memory of 2620 2796 igfxdpb32.exe 36 PID 2796 wrote to memory of 2620 2796 igfxdpb32.exe 36 PID 2796 wrote to memory of 2620 2796 igfxdpb32.exe 36 PID 2796 wrote to memory of 2620 2796 igfxdpb32.exe 36 PID 2620 wrote to memory of 2772 2620 igfxdpb32.exe 37 PID 2620 wrote to memory of 2772 2620 igfxdpb32.exe 37 PID 2620 wrote to memory of 2772 2620 igfxdpb32.exe 37 PID 2620 wrote to memory of 2772 2620 igfxdpb32.exe 37 PID 2772 wrote to memory of 272 2772 igfxdpb32.exe 38 PID 2772 wrote to memory of 272 2772 igfxdpb32.exe 38 PID 2772 wrote to memory of 272 2772 igfxdpb32.exe 38 PID 2772 wrote to memory of 272 2772 igfxdpb32.exe 38 PID 272 wrote to memory of 2224 272 igfxdpb32.exe 39 PID 272 wrote to memory of 2224 272 igfxdpb32.exe 39 PID 272 wrote to memory of 2224 272 igfxdpb32.exe 39 PID 272 wrote to memory of 2224 272 igfxdpb32.exe 39 PID 2224 wrote to memory of 2236 2224 igfxdpb32.exe 40 PID 2224 wrote to memory of 2236 2224 igfxdpb32.exe 40 PID 2224 wrote to memory of 2236 2224 igfxdpb32.exe 40 PID 2224 wrote to memory of 2236 2224 igfxdpb32.exe 40 PID 2236 wrote to memory of 2152 2236 igfxdpb32.exe 41 PID 2236 wrote to memory of 2152 2236 igfxdpb32.exe 41 PID 2236 wrote to memory of 2152 2236 igfxdpb32.exe 41 PID 2236 wrote to memory of 2152 2236 igfxdpb32.exe 41 PID 2152 wrote to memory of 2448 2152 igfxdpb32.exe 42 PID 2152 wrote to memory of 2448 2152 igfxdpb32.exe 42 PID 2152 wrote to memory of 2448 2152 igfxdpb32.exe 42 PID 2152 wrote to memory of 2448 2152 igfxdpb32.exe 42 PID 2448 wrote to memory of 1700 2448 igfxdpb32.exe 43 PID 2448 wrote to memory of 1700 2448 igfxdpb32.exe 43 PID 2448 wrote to memory of 1700 2448 igfxdpb32.exe 43 PID 2448 wrote to memory of 1700 2448 igfxdpb32.exe 43 PID 1700 wrote to memory of 1920 1700 igfxdpb32.exe 44 PID 1700 wrote to memory of 1920 1700 igfxdpb32.exe 44 PID 1700 wrote to memory of 1920 1700 igfxdpb32.exe 44 PID 1700 wrote to memory of 1920 1700 igfxdpb32.exe 44 PID 1920 wrote to memory of 2424 1920 igfxdpb32.exe 45 PID 1920 wrote to memory of 2424 1920 igfxdpb32.exe 45 PID 1920 wrote to memory of 2424 1920 igfxdpb32.exe 45 PID 1920 wrote to memory of 2424 1920 igfxdpb32.exe 45 PID 2424 wrote to memory of 2968 2424 igfxdpb32.exe 46 PID 2424 wrote to memory of 2968 2424 igfxdpb32.exe 46 PID 2424 wrote to memory of 2968 2424 igfxdpb32.exe 46 PID 2424 wrote to memory of 2968 2424 igfxdpb32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Users\Admin\AppData\Local\Temp\AC293D~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:272 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2968 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:904 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2860 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2560 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2640 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2564 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1872 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2988 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2076 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2348 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:484 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2520 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:988 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:272 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1292 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2180 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:268 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1260 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1664 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2032 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2244 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2056 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1480 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2024 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE41⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:952 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE42⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2100 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2596 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1716 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1076 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1472 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2648 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:604 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE49⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1660 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE50⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1656
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD5ac293ddbb97a9b4eeb02fb756f740140
SHA1b091334fba1b5466540b513bd458d6bc8dfecf4a
SHA2561ec01f3b93491952e6f0bc3a94cc752a251de60991e4b4fdbe2a7d607122d393
SHA5122029c3515241d136df0d0a13735f28ecfc6890f03edd0d35cc67df676a6234d3500d334d8971760c9201bbe40fa3e52fcc38d69e7882b791eb03412ec954f83a