Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 22:23
Static task
static1
Behavioral task
behavioral1
Sample
b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe
-
Size
196KB
-
MD5
b3ceef2dde1288a82ae46bda8d0365ce
-
SHA1
28e978b147317f40fa002cf03b8ebc2e664a847f
-
SHA256
e3951c2cda7bad54a1114806c41a77f8a6fe75ee79c5fcaefcbf8cd6c1cc3700
-
SHA512
4d3f562e1aef7981f8048ee8f7edce39f0f866f7ebdf3014a51f53a157f1d26ad58a650dcda647eed895ad534855c2688f4b9583888eb24cffa607d30cc8fc76
-
SSDEEP
3072:fBn4Fge4DqzBvDqB+XQ8i2VE+xYUcJwFG9SaNHDTg9b4MRd8Kk0NWn:ZnNDqjsSE+lTkS6jTK0MRd8K58
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 39 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxpx32.exe -
Deletes itself 1 IoCs
pid Process 4728 igfxpx32.exe -
Executes dropped EXE 39 IoCs
pid Process 4728 igfxpx32.exe 3784 igfxpx32.exe 1760 igfxpx32.exe 2416 igfxpx32.exe 2772 igfxpx32.exe 4620 igfxpx32.exe 3480 igfxpx32.exe 4440 igfxpx32.exe 1648 igfxpx32.exe 5020 igfxpx32.exe 3956 igfxpx32.exe 4444 igfxpx32.exe 3568 igfxpx32.exe 548 igfxpx32.exe 4172 igfxpx32.exe 3960 igfxpx32.exe 2748 igfxpx32.exe 848 igfxpx32.exe 264 igfxpx32.exe 3128 igfxpx32.exe 948 igfxpx32.exe 4664 igfxpx32.exe 1684 igfxpx32.exe 3808 igfxpx32.exe 2772 igfxpx32.exe 4620 igfxpx32.exe 5096 igfxpx32.exe 2812 igfxpx32.exe 4720 igfxpx32.exe 4440 igfxpx32.exe 4372 igfxpx32.exe 1040 igfxpx32.exe 3164 igfxpx32.exe 1292 igfxpx32.exe 2728 igfxpx32.exe 372 igfxpx32.exe 3396 igfxpx32.exe 4104 igfxpx32.exe 3488 igfxpx32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpx32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 39 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe -
Modifies registry class 39 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpx32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 552 b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe 552 b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe 552 b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe 552 b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe 4728 igfxpx32.exe 4728 igfxpx32.exe 4728 igfxpx32.exe 4728 igfxpx32.exe 3784 igfxpx32.exe 3784 igfxpx32.exe 3784 igfxpx32.exe 3784 igfxpx32.exe 1760 igfxpx32.exe 1760 igfxpx32.exe 1760 igfxpx32.exe 1760 igfxpx32.exe 2416 igfxpx32.exe 2416 igfxpx32.exe 2416 igfxpx32.exe 2416 igfxpx32.exe 2772 igfxpx32.exe 2772 igfxpx32.exe 2772 igfxpx32.exe 2772 igfxpx32.exe 4620 igfxpx32.exe 4620 igfxpx32.exe 4620 igfxpx32.exe 4620 igfxpx32.exe 3480 igfxpx32.exe 3480 igfxpx32.exe 3480 igfxpx32.exe 3480 igfxpx32.exe 4440 igfxpx32.exe 4440 igfxpx32.exe 4440 igfxpx32.exe 4440 igfxpx32.exe 1648 igfxpx32.exe 1648 igfxpx32.exe 1648 igfxpx32.exe 1648 igfxpx32.exe 5020 igfxpx32.exe 5020 igfxpx32.exe 5020 igfxpx32.exe 5020 igfxpx32.exe 3956 igfxpx32.exe 3956 igfxpx32.exe 3956 igfxpx32.exe 3956 igfxpx32.exe 4444 igfxpx32.exe 4444 igfxpx32.exe 4444 igfxpx32.exe 4444 igfxpx32.exe 3568 igfxpx32.exe 3568 igfxpx32.exe 3568 igfxpx32.exe 3568 igfxpx32.exe 548 igfxpx32.exe 548 igfxpx32.exe 548 igfxpx32.exe 548 igfxpx32.exe 4172 igfxpx32.exe 4172 igfxpx32.exe 4172 igfxpx32.exe 4172 igfxpx32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 552 wrote to memory of 4728 552 b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe 84 PID 552 wrote to memory of 4728 552 b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe 84 PID 552 wrote to memory of 4728 552 b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe 84 PID 4728 wrote to memory of 3784 4728 igfxpx32.exe 87 PID 4728 wrote to memory of 3784 4728 igfxpx32.exe 87 PID 4728 wrote to memory of 3784 4728 igfxpx32.exe 87 PID 3784 wrote to memory of 1760 3784 igfxpx32.exe 93 PID 3784 wrote to memory of 1760 3784 igfxpx32.exe 93 PID 3784 wrote to memory of 1760 3784 igfxpx32.exe 93 PID 1760 wrote to memory of 2416 1760 igfxpx32.exe 98 PID 1760 wrote to memory of 2416 1760 igfxpx32.exe 98 PID 1760 wrote to memory of 2416 1760 igfxpx32.exe 98 PID 2416 wrote to memory of 2772 2416 igfxpx32.exe 99 PID 2416 wrote to memory of 2772 2416 igfxpx32.exe 99 PID 2416 wrote to memory of 2772 2416 igfxpx32.exe 99 PID 2772 wrote to memory of 4620 2772 igfxpx32.exe 100 PID 2772 wrote to memory of 4620 2772 igfxpx32.exe 100 PID 2772 wrote to memory of 4620 2772 igfxpx32.exe 100 PID 4620 wrote to memory of 3480 4620 igfxpx32.exe 101 PID 4620 wrote to memory of 3480 4620 igfxpx32.exe 101 PID 4620 wrote to memory of 3480 4620 igfxpx32.exe 101 PID 3480 wrote to memory of 4440 3480 igfxpx32.exe 104 PID 3480 wrote to memory of 4440 3480 igfxpx32.exe 104 PID 3480 wrote to memory of 4440 3480 igfxpx32.exe 104 PID 4440 wrote to memory of 1648 4440 igfxpx32.exe 106 PID 4440 wrote to memory of 1648 4440 igfxpx32.exe 106 PID 4440 wrote to memory of 1648 4440 igfxpx32.exe 106 PID 1648 wrote to memory of 5020 1648 igfxpx32.exe 107 PID 1648 wrote to memory of 5020 1648 igfxpx32.exe 107 PID 1648 wrote to memory of 5020 1648 igfxpx32.exe 107 PID 5020 wrote to memory of 3956 5020 igfxpx32.exe 108 PID 5020 wrote to memory of 3956 5020 igfxpx32.exe 108 PID 5020 wrote to memory of 3956 5020 igfxpx32.exe 108 PID 3956 wrote to memory of 4444 3956 igfxpx32.exe 109 PID 3956 wrote to memory of 4444 3956 igfxpx32.exe 109 PID 3956 wrote to memory of 4444 3956 igfxpx32.exe 109 PID 4444 wrote to memory of 3568 4444 igfxpx32.exe 110 PID 4444 wrote to memory of 3568 4444 igfxpx32.exe 110 PID 4444 wrote to memory of 3568 4444 igfxpx32.exe 110 PID 3568 wrote to memory of 548 3568 igfxpx32.exe 111 PID 3568 wrote to memory of 548 3568 igfxpx32.exe 111 PID 3568 wrote to memory of 548 3568 igfxpx32.exe 111 PID 548 wrote to memory of 4172 548 igfxpx32.exe 112 PID 548 wrote to memory of 4172 548 igfxpx32.exe 112 PID 548 wrote to memory of 4172 548 igfxpx32.exe 112 PID 4172 wrote to memory of 3960 4172 igfxpx32.exe 113 PID 4172 wrote to memory of 3960 4172 igfxpx32.exe 113 PID 4172 wrote to memory of 3960 4172 igfxpx32.exe 113 PID 3960 wrote to memory of 2748 3960 igfxpx32.exe 114 PID 3960 wrote to memory of 2748 3960 igfxpx32.exe 114 PID 3960 wrote to memory of 2748 3960 igfxpx32.exe 114 PID 2748 wrote to memory of 848 2748 igfxpx32.exe 115 PID 2748 wrote to memory of 848 2748 igfxpx32.exe 115 PID 2748 wrote to memory of 848 2748 igfxpx32.exe 115 PID 848 wrote to memory of 264 848 igfxpx32.exe 116 PID 848 wrote to memory of 264 848 igfxpx32.exe 116 PID 848 wrote to memory of 264 848 igfxpx32.exe 116 PID 264 wrote to memory of 3128 264 igfxpx32.exe 117 PID 264 wrote to memory of 3128 264 igfxpx32.exe 117 PID 264 wrote to memory of 3128 264 igfxpx32.exe 117 PID 3128 wrote to memory of 948 3128 igfxpx32.exe 118 PID 3128 wrote to memory of 948 3128 igfxpx32.exe 118 PID 3128 wrote to memory of 948 3128 igfxpx32.exe 118 PID 948 wrote to memory of 4664 948 igfxpx32.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b3ceef2dde1288a82ae46bda8d0365ce_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Users\Admin\AppData\Local\Temp\B3CEEF~1.EXE2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe9⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe13⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe17⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe21⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe23⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4664 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1684 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe25⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3808 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2772 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe27⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4620 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5096 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe29⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2812 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4720 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe31⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4440 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4372 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe33⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1040 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe34⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3164 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe35⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1292 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe36⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2728 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe37⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:372 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3396 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe39⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4104 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe40⤵
- Executes dropped EXE
- Maps connected drives based on registry
PID:3488
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD5b3ceef2dde1288a82ae46bda8d0365ce
SHA128e978b147317f40fa002cf03b8ebc2e664a847f
SHA256e3951c2cda7bad54a1114806c41a77f8a6fe75ee79c5fcaefcbf8cd6c1cc3700
SHA5124d3f562e1aef7981f8048ee8f7edce39f0f866f7ebdf3014a51f53a157f1d26ad58a650dcda647eed895ad534855c2688f4b9583888eb24cffa607d30cc8fc76