Analysis
-
max time kernel
149s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 22:23
Static task
static1
Behavioral task
behavioral1
Sample
b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe
-
Size
196KB
-
MD5
b3ceef2dde1288a82ae46bda8d0365ce
-
SHA1
28e978b147317f40fa002cf03b8ebc2e664a847f
-
SHA256
e3951c2cda7bad54a1114806c41a77f8a6fe75ee79c5fcaefcbf8cd6c1cc3700
-
SHA512
4d3f562e1aef7981f8048ee8f7edce39f0f866f7ebdf3014a51f53a157f1d26ad58a650dcda647eed895ad534855c2688f4b9583888eb24cffa607d30cc8fc76
-
SSDEEP
3072:fBn4Fge4DqzBvDqB+XQ8i2VE+xYUcJwFG9SaNHDTg9b4MRd8Kk0NWn:ZnNDqjsSE+lTkS6jTK0MRd8K58
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2336 igfxpx32.exe -
Executes dropped EXE 46 IoCs
pid Process 2336 igfxpx32.exe 2688 igfxpx32.exe 2584 igfxpx32.exe 2616 igfxpx32.exe 1736 igfxpx32.exe 2296 igfxpx32.exe 2084 igfxpx32.exe 880 igfxpx32.exe 328 igfxpx32.exe 2432 igfxpx32.exe 2892 igfxpx32.exe 2220 igfxpx32.exe 2800 igfxpx32.exe 1668 igfxpx32.exe 3012 igfxpx32.exe 3000 igfxpx32.exe 1696 igfxpx32.exe 2348 igfxpx32.exe 2760 igfxpx32.exe 2816 igfxpx32.exe 2592 igfxpx32.exe 2532 igfxpx32.exe 2608 igfxpx32.exe 3056 igfxpx32.exe 2900 igfxpx32.exe 1336 igfxpx32.exe 1224 igfxpx32.exe 2928 igfxpx32.exe 468 igfxpx32.exe 1120 igfxpx32.exe 1060 igfxpx32.exe 1732 igfxpx32.exe 1752 igfxpx32.exe 2540 igfxpx32.exe 1668 igfxpx32.exe 1940 igfxpx32.exe 2260 igfxpx32.exe 2324 igfxpx32.exe 2840 igfxpx32.exe 2776 igfxpx32.exe 936 igfxpx32.exe 2784 igfxpx32.exe 1848 igfxpx32.exe 2652 igfxpx32.exe 2552 igfxpx32.exe 344 igfxpx32.exe -
Loads dropped DLL 64 IoCs
pid Process 2256 b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe 2256 b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe 2336 igfxpx32.exe 2336 igfxpx32.exe 2688 igfxpx32.exe 2688 igfxpx32.exe 2584 igfxpx32.exe 2584 igfxpx32.exe 2616 igfxpx32.exe 2616 igfxpx32.exe 1736 igfxpx32.exe 1736 igfxpx32.exe 2296 igfxpx32.exe 2296 igfxpx32.exe 2084 igfxpx32.exe 2084 igfxpx32.exe 880 igfxpx32.exe 880 igfxpx32.exe 328 igfxpx32.exe 328 igfxpx32.exe 2432 igfxpx32.exe 2432 igfxpx32.exe 2892 igfxpx32.exe 2892 igfxpx32.exe 2220 igfxpx32.exe 2220 igfxpx32.exe 2800 igfxpx32.exe 2800 igfxpx32.exe 1668 igfxpx32.exe 1668 igfxpx32.exe 3012 igfxpx32.exe 3012 igfxpx32.exe 3000 igfxpx32.exe 3000 igfxpx32.exe 1696 igfxpx32.exe 1696 igfxpx32.exe 2348 igfxpx32.exe 2348 igfxpx32.exe 2760 igfxpx32.exe 2760 igfxpx32.exe 2816 igfxpx32.exe 2816 igfxpx32.exe 2592 igfxpx32.exe 2592 igfxpx32.exe 2532 igfxpx32.exe 2532 igfxpx32.exe 2608 igfxpx32.exe 2608 igfxpx32.exe 3056 igfxpx32.exe 3056 igfxpx32.exe 2900 igfxpx32.exe 2900 igfxpx32.exe 1336 igfxpx32.exe 1336 igfxpx32.exe 1224 igfxpx32.exe 1224 igfxpx32.exe 2928 igfxpx32.exe 2928 igfxpx32.exe 468 igfxpx32.exe 468 igfxpx32.exe 1120 igfxpx32.exe 1120 igfxpx32.exe 1060 igfxpx32.exe 1060 igfxpx32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 46 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2256 b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe 2256 b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe 2336 igfxpx32.exe 2336 igfxpx32.exe 2688 igfxpx32.exe 2688 igfxpx32.exe 2584 igfxpx32.exe 2584 igfxpx32.exe 2616 igfxpx32.exe 2616 igfxpx32.exe 1736 igfxpx32.exe 1736 igfxpx32.exe 2296 igfxpx32.exe 2296 igfxpx32.exe 2084 igfxpx32.exe 2084 igfxpx32.exe 880 igfxpx32.exe 880 igfxpx32.exe 328 igfxpx32.exe 328 igfxpx32.exe 2432 igfxpx32.exe 2432 igfxpx32.exe 2892 igfxpx32.exe 2892 igfxpx32.exe 2220 igfxpx32.exe 2220 igfxpx32.exe 2800 igfxpx32.exe 2800 igfxpx32.exe 1668 igfxpx32.exe 1668 igfxpx32.exe 3012 igfxpx32.exe 3012 igfxpx32.exe 3000 igfxpx32.exe 3000 igfxpx32.exe 1696 igfxpx32.exe 1696 igfxpx32.exe 2348 igfxpx32.exe 2348 igfxpx32.exe 2760 igfxpx32.exe 2760 igfxpx32.exe 2816 igfxpx32.exe 2816 igfxpx32.exe 2592 igfxpx32.exe 2592 igfxpx32.exe 2532 igfxpx32.exe 2532 igfxpx32.exe 2608 igfxpx32.exe 2608 igfxpx32.exe 3056 igfxpx32.exe 3056 igfxpx32.exe 2900 igfxpx32.exe 2900 igfxpx32.exe 1336 igfxpx32.exe 1336 igfxpx32.exe 1224 igfxpx32.exe 1224 igfxpx32.exe 2928 igfxpx32.exe 2928 igfxpx32.exe 468 igfxpx32.exe 468 igfxpx32.exe 1120 igfxpx32.exe 1120 igfxpx32.exe 1060 igfxpx32.exe 1060 igfxpx32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2336 2256 b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe 31 PID 2256 wrote to memory of 2336 2256 b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe 31 PID 2256 wrote to memory of 2336 2256 b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe 31 PID 2256 wrote to memory of 2336 2256 b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe 31 PID 2336 wrote to memory of 2688 2336 igfxpx32.exe 32 PID 2336 wrote to memory of 2688 2336 igfxpx32.exe 32 PID 2336 wrote to memory of 2688 2336 igfxpx32.exe 32 PID 2336 wrote to memory of 2688 2336 igfxpx32.exe 32 PID 2688 wrote to memory of 2584 2688 igfxpx32.exe 33 PID 2688 wrote to memory of 2584 2688 igfxpx32.exe 33 PID 2688 wrote to memory of 2584 2688 igfxpx32.exe 33 PID 2688 wrote to memory of 2584 2688 igfxpx32.exe 33 PID 2584 wrote to memory of 2616 2584 igfxpx32.exe 34 PID 2584 wrote to memory of 2616 2584 igfxpx32.exe 34 PID 2584 wrote to memory of 2616 2584 igfxpx32.exe 34 PID 2584 wrote to memory of 2616 2584 igfxpx32.exe 34 PID 2616 wrote to memory of 1736 2616 igfxpx32.exe 35 PID 2616 wrote to memory of 1736 2616 igfxpx32.exe 35 PID 2616 wrote to memory of 1736 2616 igfxpx32.exe 35 PID 2616 wrote to memory of 1736 2616 igfxpx32.exe 35 PID 1736 wrote to memory of 2296 1736 igfxpx32.exe 36 PID 1736 wrote to memory of 2296 1736 igfxpx32.exe 36 PID 1736 wrote to memory of 2296 1736 igfxpx32.exe 36 PID 1736 wrote to memory of 2296 1736 igfxpx32.exe 36 PID 2296 wrote to memory of 2084 2296 igfxpx32.exe 37 PID 2296 wrote to memory of 2084 2296 igfxpx32.exe 37 PID 2296 wrote to memory of 2084 2296 igfxpx32.exe 37 PID 2296 wrote to memory of 2084 2296 igfxpx32.exe 37 PID 2084 wrote to memory of 880 2084 igfxpx32.exe 38 PID 2084 wrote to memory of 880 2084 igfxpx32.exe 38 PID 2084 wrote to memory of 880 2084 igfxpx32.exe 38 PID 2084 wrote to memory of 880 2084 igfxpx32.exe 38 PID 880 wrote to memory of 328 880 igfxpx32.exe 39 PID 880 wrote to memory of 328 880 igfxpx32.exe 39 PID 880 wrote to memory of 328 880 igfxpx32.exe 39 PID 880 wrote to memory of 328 880 igfxpx32.exe 39 PID 328 wrote to memory of 2432 328 igfxpx32.exe 40 PID 328 wrote to memory of 2432 328 igfxpx32.exe 40 PID 328 wrote to memory of 2432 328 igfxpx32.exe 40 PID 328 wrote to memory of 2432 328 igfxpx32.exe 40 PID 2432 wrote to memory of 2892 2432 igfxpx32.exe 41 PID 2432 wrote to memory of 2892 2432 igfxpx32.exe 41 PID 2432 wrote to memory of 2892 2432 igfxpx32.exe 41 PID 2432 wrote to memory of 2892 2432 igfxpx32.exe 41 PID 2892 wrote to memory of 2220 2892 igfxpx32.exe 42 PID 2892 wrote to memory of 2220 2892 igfxpx32.exe 42 PID 2892 wrote to memory of 2220 2892 igfxpx32.exe 42 PID 2892 wrote to memory of 2220 2892 igfxpx32.exe 42 PID 2220 wrote to memory of 2800 2220 igfxpx32.exe 43 PID 2220 wrote to memory of 2800 2220 igfxpx32.exe 43 PID 2220 wrote to memory of 2800 2220 igfxpx32.exe 43 PID 2220 wrote to memory of 2800 2220 igfxpx32.exe 43 PID 2800 wrote to memory of 1668 2800 igfxpx32.exe 44 PID 2800 wrote to memory of 1668 2800 igfxpx32.exe 44 PID 2800 wrote to memory of 1668 2800 igfxpx32.exe 44 PID 2800 wrote to memory of 1668 2800 igfxpx32.exe 44 PID 1668 wrote to memory of 3012 1668 igfxpx32.exe 45 PID 1668 wrote to memory of 3012 1668 igfxpx32.exe 45 PID 1668 wrote to memory of 3012 1668 igfxpx32.exe 45 PID 1668 wrote to memory of 3012 1668 igfxpx32.exe 45 PID 3012 wrote to memory of 3000 3012 igfxpx32.exe 46 PID 3012 wrote to memory of 3000 3012 igfxpx32.exe 46 PID 3012 wrote to memory of 3000 3012 igfxpx32.exe 46 PID 3012 wrote to memory of 3000 3012 igfxpx32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Users\Admin\AppData\Local\Temp\B3CEEF~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3000 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1696 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2348 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2760 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2816 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2592 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2532 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2608 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3056 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2900 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1336 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1224 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2928 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:468 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1120 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1060 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1732 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1752 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2540 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1668 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1940 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2260 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2324 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2840 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2776 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:936 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2784 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1848 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2652 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2552 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe47⤵
- Executes dropped EXE
- Maps connected drives based on registry
PID:344
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD5b3ceef2dde1288a82ae46bda8d0365ce
SHA128e978b147317f40fa002cf03b8ebc2e664a847f
SHA256e3951c2cda7bad54a1114806c41a77f8a6fe75ee79c5fcaefcbf8cd6c1cc3700
SHA5124d3f562e1aef7981f8048ee8f7edce39f0f866f7ebdf3014a51f53a157f1d26ad58a650dcda647eed895ad534855c2688f4b9583888eb24cffa607d30cc8fc76