Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 11:27
Static task
static1
Behavioral task
behavioral1
Sample
ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe
-
Size
213KB
-
MD5
ac293ddbb97a9b4eeb02fb756f740140
-
SHA1
b091334fba1b5466540b513bd458d6bc8dfecf4a
-
SHA256
1ec01f3b93491952e6f0bc3a94cc752a251de60991e4b4fdbe2a7d607122d393
-
SHA512
2029c3515241d136df0d0a13735f28ecfc6890f03edd0d35cc67df676a6234d3500d334d8971760c9201bbe40fa3e52fcc38d69e7882b791eb03412ec954f83a
-
SSDEEP
6144:AwRxlIAXOs5iHw4MSmz6fWnCyyFGhYTZqXcXoEy:h6iiQdSPfWkFTX4
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 43 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxdpb32.exe -
Deletes itself 1 IoCs
pid Process 4292 igfxdpb32.exe -
Executes dropped EXE 42 IoCs
pid Process 4292 igfxdpb32.exe 4020 igfxdpb32.exe 4604 igfxdpb32.exe 3964 igfxdpb32.exe 1496 igfxdpb32.exe 612 igfxdpb32.exe 2368 igfxdpb32.exe 4340 igfxdpb32.exe 1708 igfxdpb32.exe 1384 igfxdpb32.exe 4468 igfxdpb32.exe 3624 igfxdpb32.exe 2328 igfxdpb32.exe 852 igfxdpb32.exe 1616 igfxdpb32.exe 1468 igfxdpb32.exe 1988 igfxdpb32.exe 1632 igfxdpb32.exe 2364 igfxdpb32.exe 2388 igfxdpb32.exe 2572 igfxdpb32.exe 4572 igfxdpb32.exe 2424 igfxdpb32.exe 4320 igfxdpb32.exe 4656 igfxdpb32.exe 3672 igfxdpb32.exe 2716 igfxdpb32.exe 1628 igfxdpb32.exe 1168 igfxdpb32.exe 1712 igfxdpb32.exe 2864 igfxdpb32.exe 1820 igfxdpb32.exe 4812 igfxdpb32.exe 1896 igfxdpb32.exe 4972 igfxdpb32.exe 4516 igfxdpb32.exe 656 igfxdpb32.exe 4460 igfxdpb32.exe 2544 igfxdpb32.exe 4276 igfxdpb32.exe 3532 igfxdpb32.exe 1992 igfxdpb32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpb32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File created C:\Windows\SysWOW64\igfxdpb32.exe igfxdpb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpb32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 43 IoCs
pid Process 3984 ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe 4292 igfxdpb32.exe 4020 igfxdpb32.exe 4604 igfxdpb32.exe 3964 igfxdpb32.exe 1496 igfxdpb32.exe 612 igfxdpb32.exe 2368 igfxdpb32.exe 4340 igfxdpb32.exe 1708 igfxdpb32.exe 1384 igfxdpb32.exe 4468 igfxdpb32.exe 3624 igfxdpb32.exe 2328 igfxdpb32.exe 852 igfxdpb32.exe 1616 igfxdpb32.exe 1468 igfxdpb32.exe 1988 igfxdpb32.exe 1632 igfxdpb32.exe 2364 igfxdpb32.exe 2388 igfxdpb32.exe 2572 igfxdpb32.exe 4572 igfxdpb32.exe 2424 igfxdpb32.exe 4320 igfxdpb32.exe 4656 igfxdpb32.exe 3672 igfxdpb32.exe 2716 igfxdpb32.exe 1628 igfxdpb32.exe 1168 igfxdpb32.exe 1712 igfxdpb32.exe 2864 igfxdpb32.exe 1820 igfxdpb32.exe 4812 igfxdpb32.exe 1896 igfxdpb32.exe 4972 igfxdpb32.exe 4516 igfxdpb32.exe 656 igfxdpb32.exe 4460 igfxdpb32.exe 2544 igfxdpb32.exe 4276 igfxdpb32.exe 3532 igfxdpb32.exe 1992 igfxdpb32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 43 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpb32.exe -
Modifies registry class 43 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpb32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3984 ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe 3984 ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe 4292 igfxdpb32.exe 4292 igfxdpb32.exe 4020 igfxdpb32.exe 4020 igfxdpb32.exe 4604 igfxdpb32.exe 4604 igfxdpb32.exe 3964 igfxdpb32.exe 3964 igfxdpb32.exe 1496 igfxdpb32.exe 1496 igfxdpb32.exe 612 igfxdpb32.exe 612 igfxdpb32.exe 2368 igfxdpb32.exe 2368 igfxdpb32.exe 4340 igfxdpb32.exe 4340 igfxdpb32.exe 1708 igfxdpb32.exe 1708 igfxdpb32.exe 1384 igfxdpb32.exe 1384 igfxdpb32.exe 4468 igfxdpb32.exe 4468 igfxdpb32.exe 3624 igfxdpb32.exe 3624 igfxdpb32.exe 2328 igfxdpb32.exe 2328 igfxdpb32.exe 852 igfxdpb32.exe 852 igfxdpb32.exe 1616 igfxdpb32.exe 1616 igfxdpb32.exe 1468 igfxdpb32.exe 1468 igfxdpb32.exe 1988 igfxdpb32.exe 1988 igfxdpb32.exe 1632 igfxdpb32.exe 1632 igfxdpb32.exe 2364 igfxdpb32.exe 2364 igfxdpb32.exe 2388 igfxdpb32.exe 2388 igfxdpb32.exe 2572 igfxdpb32.exe 2572 igfxdpb32.exe 4572 igfxdpb32.exe 4572 igfxdpb32.exe 2424 igfxdpb32.exe 2424 igfxdpb32.exe 4320 igfxdpb32.exe 4320 igfxdpb32.exe 4656 igfxdpb32.exe 4656 igfxdpb32.exe 3672 igfxdpb32.exe 3672 igfxdpb32.exe 2716 igfxdpb32.exe 2716 igfxdpb32.exe 1628 igfxdpb32.exe 1628 igfxdpb32.exe 1168 igfxdpb32.exe 1168 igfxdpb32.exe 1712 igfxdpb32.exe 1712 igfxdpb32.exe 2864 igfxdpb32.exe 2864 igfxdpb32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3984 wrote to memory of 4292 3984 ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe 85 PID 3984 wrote to memory of 4292 3984 ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe 85 PID 3984 wrote to memory of 4292 3984 ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe 85 PID 4292 wrote to memory of 4020 4292 igfxdpb32.exe 92 PID 4292 wrote to memory of 4020 4292 igfxdpb32.exe 92 PID 4292 wrote to memory of 4020 4292 igfxdpb32.exe 92 PID 4020 wrote to memory of 4604 4020 igfxdpb32.exe 98 PID 4020 wrote to memory of 4604 4020 igfxdpb32.exe 98 PID 4020 wrote to memory of 4604 4020 igfxdpb32.exe 98 PID 4604 wrote to memory of 3964 4604 igfxdpb32.exe 100 PID 4604 wrote to memory of 3964 4604 igfxdpb32.exe 100 PID 4604 wrote to memory of 3964 4604 igfxdpb32.exe 100 PID 3964 wrote to memory of 1496 3964 igfxdpb32.exe 101 PID 3964 wrote to memory of 1496 3964 igfxdpb32.exe 101 PID 3964 wrote to memory of 1496 3964 igfxdpb32.exe 101 PID 1496 wrote to memory of 612 1496 igfxdpb32.exe 102 PID 1496 wrote to memory of 612 1496 igfxdpb32.exe 102 PID 1496 wrote to memory of 612 1496 igfxdpb32.exe 102 PID 612 wrote to memory of 2368 612 igfxdpb32.exe 103 PID 612 wrote to memory of 2368 612 igfxdpb32.exe 103 PID 612 wrote to memory of 2368 612 igfxdpb32.exe 103 PID 2368 wrote to memory of 4340 2368 igfxdpb32.exe 104 PID 2368 wrote to memory of 4340 2368 igfxdpb32.exe 104 PID 2368 wrote to memory of 4340 2368 igfxdpb32.exe 104 PID 4340 wrote to memory of 1708 4340 igfxdpb32.exe 107 PID 4340 wrote to memory of 1708 4340 igfxdpb32.exe 107 PID 4340 wrote to memory of 1708 4340 igfxdpb32.exe 107 PID 1708 wrote to memory of 1384 1708 igfxdpb32.exe 109 PID 1708 wrote to memory of 1384 1708 igfxdpb32.exe 109 PID 1708 wrote to memory of 1384 1708 igfxdpb32.exe 109 PID 1384 wrote to memory of 4468 1384 igfxdpb32.exe 110 PID 1384 wrote to memory of 4468 1384 igfxdpb32.exe 110 PID 1384 wrote to memory of 4468 1384 igfxdpb32.exe 110 PID 4468 wrote to memory of 3624 4468 igfxdpb32.exe 111 PID 4468 wrote to memory of 3624 4468 igfxdpb32.exe 111 PID 4468 wrote to memory of 3624 4468 igfxdpb32.exe 111 PID 3624 wrote to memory of 2328 3624 igfxdpb32.exe 112 PID 3624 wrote to memory of 2328 3624 igfxdpb32.exe 112 PID 3624 wrote to memory of 2328 3624 igfxdpb32.exe 112 PID 2328 wrote to memory of 852 2328 igfxdpb32.exe 113 PID 2328 wrote to memory of 852 2328 igfxdpb32.exe 113 PID 2328 wrote to memory of 852 2328 igfxdpb32.exe 113 PID 852 wrote to memory of 1616 852 igfxdpb32.exe 114 PID 852 wrote to memory of 1616 852 igfxdpb32.exe 114 PID 852 wrote to memory of 1616 852 igfxdpb32.exe 114 PID 1616 wrote to memory of 1468 1616 igfxdpb32.exe 115 PID 1616 wrote to memory of 1468 1616 igfxdpb32.exe 115 PID 1616 wrote to memory of 1468 1616 igfxdpb32.exe 115 PID 1468 wrote to memory of 1988 1468 igfxdpb32.exe 116 PID 1468 wrote to memory of 1988 1468 igfxdpb32.exe 116 PID 1468 wrote to memory of 1988 1468 igfxdpb32.exe 116 PID 1988 wrote to memory of 1632 1988 igfxdpb32.exe 118 PID 1988 wrote to memory of 1632 1988 igfxdpb32.exe 118 PID 1988 wrote to memory of 1632 1988 igfxdpb32.exe 118 PID 1632 wrote to memory of 2364 1632 igfxdpb32.exe 119 PID 1632 wrote to memory of 2364 1632 igfxdpb32.exe 119 PID 1632 wrote to memory of 2364 1632 igfxdpb32.exe 119 PID 2364 wrote to memory of 2388 2364 igfxdpb32.exe 120 PID 2364 wrote to memory of 2388 2364 igfxdpb32.exe 120 PID 2364 wrote to memory of 2388 2364 igfxdpb32.exe 120 PID 2388 wrote to memory of 2572 2388 igfxdpb32.exe 121 PID 2388 wrote to memory of 2572 2388 igfxdpb32.exe 121 PID 2388 wrote to memory of 2572 2388 igfxdpb32.exe 121 PID 2572 wrote to memory of 4572 2572 igfxdpb32.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ac293ddbb97a9b4eeb02fb756f740140_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Users\Admin\AppData\Local\Temp\AC293D~1.EXE2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE3⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE5⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE7⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE9⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE11⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE13⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE15⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE17⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE19⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE21⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE23⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4572 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2424 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE25⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4320 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4656 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE27⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3672 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2716 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE29⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1628 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1168 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE31⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1712 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2864 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE33⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1820 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4812 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE35⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1896 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4972 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE37⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4516 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:656 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE39⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4460 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2544 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE41⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4276 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3532 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE43⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1992 -
C:\Windows\SysWOW64\igfxdpb32.exe"C:\Windows\system32\igfxdpb32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE44⤵PID:4296
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD5ac293ddbb97a9b4eeb02fb756f740140
SHA1b091334fba1b5466540b513bd458d6bc8dfecf4a
SHA2561ec01f3b93491952e6f0bc3a94cc752a251de60991e4b4fdbe2a7d607122d393
SHA5122029c3515241d136df0d0a13735f28ecfc6890f03edd0d35cc67df676a6234d3500d334d8971760c9201bbe40fa3e52fcc38d69e7882b791eb03412ec954f83a