Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 00:37
Static task
static1
Behavioral task
behavioral1
Sample
ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118.exe
-
Size
226KB
-
MD5
ae0fd5c3d36d0cfe612115d131f03b99
-
SHA1
18171ff53a1ca2730d5ed5372ebb04d487d6993e
-
SHA256
7acb2831a29b4a02675f87a331e929731ab0a10874c651c744224d8846a9c61d
-
SHA512
98c875e911632541802187bc85a76c8d8b93ca20d82098eee6e45a2e0bbe5347bc7bcb0e571f8da9c64128c9a0b27217eb780ff485cd5c1f4942e21973faefc2
-
SSDEEP
6144:wnLYIPeKZF0FO5/9oyOMXGPFQNXj//uoj:wn8oZF0c9PXGtQlj/Lj
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2712 igfxscr32.exe -
Executes dropped EXE 49 IoCs
pid Process 2712 igfxscr32.exe 1820 igfxscr32.exe 2812 igfxscr32.exe 2580 igfxscr32.exe 1696 igfxscr32.exe 2232 igfxscr32.exe 1632 igfxscr32.exe 980 igfxscr32.exe 2800 igfxscr32.exe 276 igfxscr32.exe 1564 igfxscr32.exe 2696 igfxscr32.exe 1748 igfxscr32.exe 1924 igfxscr32.exe 2960 igfxscr32.exe 2808 igfxscr32.exe 2912 igfxscr32.exe 1336 igfxscr32.exe 2352 igfxscr32.exe 2436 igfxscr32.exe 1796 igfxscr32.exe 2664 igfxscr32.exe 1724 igfxscr32.exe 2968 igfxscr32.exe 3012 igfxscr32.exe 1684 igfxscr32.exe 2368 igfxscr32.exe 320 igfxscr32.exe 2504 igfxscr32.exe 268 igfxscr32.exe 552 igfxscr32.exe 2260 igfxscr32.exe 2448 igfxscr32.exe 2716 igfxscr32.exe 2868 igfxscr32.exe 2568 igfxscr32.exe 2696 igfxscr32.exe 1820 igfxscr32.exe 924 igfxscr32.exe 2096 igfxscr32.exe 2740 igfxscr32.exe 1608 igfxscr32.exe 1788 igfxscr32.exe 2184 igfxscr32.exe 2612 igfxscr32.exe 1288 igfxscr32.exe 1628 igfxscr32.exe 2848 igfxscr32.exe 1932 igfxscr32.exe -
Loads dropped DLL 64 IoCs
pid Process 2616 ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118.exe 2616 ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118.exe 2712 igfxscr32.exe 2712 igfxscr32.exe 1820 igfxscr32.exe 1820 igfxscr32.exe 2812 igfxscr32.exe 2812 igfxscr32.exe 2580 igfxscr32.exe 2580 igfxscr32.exe 1696 igfxscr32.exe 1696 igfxscr32.exe 2232 igfxscr32.exe 2232 igfxscr32.exe 1632 igfxscr32.exe 1632 igfxscr32.exe 980 igfxscr32.exe 980 igfxscr32.exe 2800 igfxscr32.exe 2800 igfxscr32.exe 276 igfxscr32.exe 276 igfxscr32.exe 1564 igfxscr32.exe 1564 igfxscr32.exe 2696 igfxscr32.exe 2696 igfxscr32.exe 1748 igfxscr32.exe 1748 igfxscr32.exe 1924 igfxscr32.exe 1924 igfxscr32.exe 2960 igfxscr32.exe 2960 igfxscr32.exe 2808 igfxscr32.exe 2808 igfxscr32.exe 2912 igfxscr32.exe 2912 igfxscr32.exe 1336 igfxscr32.exe 1336 igfxscr32.exe 2352 igfxscr32.exe 2352 igfxscr32.exe 2436 igfxscr32.exe 2436 igfxscr32.exe 1796 igfxscr32.exe 1796 igfxscr32.exe 2664 igfxscr32.exe 2664 igfxscr32.exe 1724 igfxscr32.exe 1724 igfxscr32.exe 2968 igfxscr32.exe 2968 igfxscr32.exe 3012 igfxscr32.exe 3012 igfxscr32.exe 1684 igfxscr32.exe 1684 igfxscr32.exe 2368 igfxscr32.exe 2368 igfxscr32.exe 320 igfxscr32.exe 320 igfxscr32.exe 2504 igfxscr32.exe 2504 igfxscr32.exe 268 igfxscr32.exe 268 igfxscr32.exe 552 igfxscr32.exe 552 igfxscr32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxscr32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 50 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2616 ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118.exe 2616 ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118.exe 2616 ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118.exe 2616 ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118.exe 2616 ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118.exe 2616 ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118.exe 2616 ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118.exe 2616 ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118.exe 2616 ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118.exe 2616 ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118.exe 2616 ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118.exe 2616 ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118.exe 2616 ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118.exe 2616 ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118.exe 2616 ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118.exe 2712 igfxscr32.exe 2712 igfxscr32.exe 2712 igfxscr32.exe 2712 igfxscr32.exe 2712 igfxscr32.exe 2712 igfxscr32.exe 2712 igfxscr32.exe 2712 igfxscr32.exe 2712 igfxscr32.exe 2712 igfxscr32.exe 2712 igfxscr32.exe 2712 igfxscr32.exe 2712 igfxscr32.exe 2712 igfxscr32.exe 2712 igfxscr32.exe 1820 igfxscr32.exe 1820 igfxscr32.exe 1820 igfxscr32.exe 1820 igfxscr32.exe 1820 igfxscr32.exe 1820 igfxscr32.exe 1820 igfxscr32.exe 1820 igfxscr32.exe 1820 igfxscr32.exe 1820 igfxscr32.exe 1820 igfxscr32.exe 1820 igfxscr32.exe 1820 igfxscr32.exe 1820 igfxscr32.exe 1820 igfxscr32.exe 2812 igfxscr32.exe 2812 igfxscr32.exe 2812 igfxscr32.exe 2812 igfxscr32.exe 2812 igfxscr32.exe 2812 igfxscr32.exe 2812 igfxscr32.exe 2812 igfxscr32.exe 2812 igfxscr32.exe 2812 igfxscr32.exe 2812 igfxscr32.exe 2812 igfxscr32.exe 2812 igfxscr32.exe 2812 igfxscr32.exe 2812 igfxscr32.exe 2580 igfxscr32.exe 2580 igfxscr32.exe 2580 igfxscr32.exe 2580 igfxscr32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2712 2616 ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118.exe 30 PID 2616 wrote to memory of 2712 2616 ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118.exe 30 PID 2616 wrote to memory of 2712 2616 ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118.exe 30 PID 2616 wrote to memory of 2712 2616 ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118.exe 30 PID 2712 wrote to memory of 1820 2712 igfxscr32.exe 31 PID 2712 wrote to memory of 1820 2712 igfxscr32.exe 31 PID 2712 wrote to memory of 1820 2712 igfxscr32.exe 31 PID 2712 wrote to memory of 1820 2712 igfxscr32.exe 31 PID 1820 wrote to memory of 2812 1820 igfxscr32.exe 32 PID 1820 wrote to memory of 2812 1820 igfxscr32.exe 32 PID 1820 wrote to memory of 2812 1820 igfxscr32.exe 32 PID 1820 wrote to memory of 2812 1820 igfxscr32.exe 32 PID 2812 wrote to memory of 2580 2812 igfxscr32.exe 33 PID 2812 wrote to memory of 2580 2812 igfxscr32.exe 33 PID 2812 wrote to memory of 2580 2812 igfxscr32.exe 33 PID 2812 wrote to memory of 2580 2812 igfxscr32.exe 33 PID 2580 wrote to memory of 1696 2580 igfxscr32.exe 34 PID 2580 wrote to memory of 1696 2580 igfxscr32.exe 34 PID 2580 wrote to memory of 1696 2580 igfxscr32.exe 34 PID 2580 wrote to memory of 1696 2580 igfxscr32.exe 34 PID 1696 wrote to memory of 2232 1696 igfxscr32.exe 35 PID 1696 wrote to memory of 2232 1696 igfxscr32.exe 35 PID 1696 wrote to memory of 2232 1696 igfxscr32.exe 35 PID 1696 wrote to memory of 2232 1696 igfxscr32.exe 35 PID 2232 wrote to memory of 1632 2232 igfxscr32.exe 36 PID 2232 wrote to memory of 1632 2232 igfxscr32.exe 36 PID 2232 wrote to memory of 1632 2232 igfxscr32.exe 36 PID 2232 wrote to memory of 1632 2232 igfxscr32.exe 36 PID 1632 wrote to memory of 980 1632 igfxscr32.exe 37 PID 1632 wrote to memory of 980 1632 igfxscr32.exe 37 PID 1632 wrote to memory of 980 1632 igfxscr32.exe 37 PID 1632 wrote to memory of 980 1632 igfxscr32.exe 37 PID 980 wrote to memory of 2800 980 igfxscr32.exe 38 PID 980 wrote to memory of 2800 980 igfxscr32.exe 38 PID 980 wrote to memory of 2800 980 igfxscr32.exe 38 PID 980 wrote to memory of 2800 980 igfxscr32.exe 38 PID 2800 wrote to memory of 276 2800 igfxscr32.exe 39 PID 2800 wrote to memory of 276 2800 igfxscr32.exe 39 PID 2800 wrote to memory of 276 2800 igfxscr32.exe 39 PID 2800 wrote to memory of 276 2800 igfxscr32.exe 39 PID 276 wrote to memory of 1564 276 igfxscr32.exe 40 PID 276 wrote to memory of 1564 276 igfxscr32.exe 40 PID 276 wrote to memory of 1564 276 igfxscr32.exe 40 PID 276 wrote to memory of 1564 276 igfxscr32.exe 40 PID 1564 wrote to memory of 2696 1564 igfxscr32.exe 41 PID 1564 wrote to memory of 2696 1564 igfxscr32.exe 41 PID 1564 wrote to memory of 2696 1564 igfxscr32.exe 41 PID 1564 wrote to memory of 2696 1564 igfxscr32.exe 41 PID 2696 wrote to memory of 1748 2696 igfxscr32.exe 42 PID 2696 wrote to memory of 1748 2696 igfxscr32.exe 42 PID 2696 wrote to memory of 1748 2696 igfxscr32.exe 42 PID 2696 wrote to memory of 1748 2696 igfxscr32.exe 42 PID 1748 wrote to memory of 1924 1748 igfxscr32.exe 43 PID 1748 wrote to memory of 1924 1748 igfxscr32.exe 43 PID 1748 wrote to memory of 1924 1748 igfxscr32.exe 43 PID 1748 wrote to memory of 1924 1748 igfxscr32.exe 43 PID 1924 wrote to memory of 2960 1924 igfxscr32.exe 44 PID 1924 wrote to memory of 2960 1924 igfxscr32.exe 44 PID 1924 wrote to memory of 2960 1924 igfxscr32.exe 44 PID 1924 wrote to memory of 2960 1924 igfxscr32.exe 44 PID 2960 wrote to memory of 2808 2960 igfxscr32.exe 45 PID 2960 wrote to memory of 2808 2960 igfxscr32.exe 45 PID 2960 wrote to memory of 2808 2960 igfxscr32.exe 45 PID 2960 wrote to memory of 2808 2960 igfxscr32.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Users\Admin\AppData\Local\Temp\AE0FD5~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2808 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2912 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1336 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2352 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2436 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1796 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2664 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1724 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3012 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1684 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2368 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:320 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2504 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:268 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:552 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2260 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2448 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2716 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2868 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2568 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2696 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1820 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:924 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2096 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2740 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1608 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1788 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2184 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2612 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1288 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1628 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE49⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2848 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE50⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1932 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE51⤵PID:2568
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226KB
MD5ae0fd5c3d36d0cfe612115d131f03b99
SHA118171ff53a1ca2730d5ed5372ebb04d487d6993e
SHA2567acb2831a29b4a02675f87a331e929731ab0a10874c651c744224d8846a9c61d
SHA51298c875e911632541802187bc85a76c8d8b93ca20d82098eee6e45a2e0bbe5347bc7bcb0e571f8da9c64128c9a0b27217eb780ff485cd5c1f4942e21973faefc2