Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 11:09
Behavioral task
behavioral1
Sample
b0d9e6cdf8fc60a795fdff8a88e2b864_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
b0d9e6cdf8fc60a795fdff8a88e2b864_JaffaCakes118.exe
-
Size
262KB
-
MD5
b0d9e6cdf8fc60a795fdff8a88e2b864
-
SHA1
44114e50f546027281fce486ba905f2f27d77c84
-
SHA256
16a6ddb6df051d58f9fbf3b3ad26790cb4816d29d5ce441dc78f47e23d7e994e
-
SHA512
60458528522d9522cc342f5852e8e6cd602a58b3a718d6a5687b5b29f87b488d4eea6cbf664628380a4e67105a8870ec367cf3925b0fae2205f7318e7da8b4e3
-
SSDEEP
6144:oFfdzUY+cTMpVkdVcV3mOSCnMDWBWazgjU2:oNr+qMpVkdVctI6tIzjN
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2820 igfxbm32.exe -
Executes dropped EXE 44 IoCs
pid Process 2820 igfxbm32.exe 2828 igfxbm32.exe 2224 igfxbm32.exe 2896 igfxbm32.exe 708 igfxbm32.exe 1664 igfxbm32.exe 2864 igfxbm32.exe 1048 igfxbm32.exe 2116 igfxbm32.exe 1792 igfxbm32.exe 2004 igfxbm32.exe 788 igfxbm32.exe 2020 igfxbm32.exe 1000 igfxbm32.exe 1632 igfxbm32.exe 2016 igfxbm32.exe 892 igfxbm32.exe 2688 igfxbm32.exe 2784 igfxbm32.exe 2128 igfxbm32.exe 2696 igfxbm32.exe 2608 igfxbm32.exe 2152 igfxbm32.exe 3008 igfxbm32.exe 2156 igfxbm32.exe 1764 igfxbm32.exe 1636 igfxbm32.exe 2856 igfxbm32.exe 2860 igfxbm32.exe 1124 igfxbm32.exe 1896 igfxbm32.exe 1148 igfxbm32.exe 1640 igfxbm32.exe 1892 igfxbm32.exe 2844 igfxbm32.exe 1804 igfxbm32.exe 1992 igfxbm32.exe 1252 igfxbm32.exe 2332 igfxbm32.exe 1200 igfxbm32.exe 2940 igfxbm32.exe 2112 igfxbm32.exe 2300 igfxbm32.exe 2804 igfxbm32.exe -
Loads dropped DLL 64 IoCs
pid Process 2272 b0d9e6cdf8fc60a795fdff8a88e2b864_JaffaCakes118.exe 2272 b0d9e6cdf8fc60a795fdff8a88e2b864_JaffaCakes118.exe 2820 igfxbm32.exe 2820 igfxbm32.exe 2828 igfxbm32.exe 2828 igfxbm32.exe 2224 igfxbm32.exe 2224 igfxbm32.exe 2896 igfxbm32.exe 2896 igfxbm32.exe 708 igfxbm32.exe 708 igfxbm32.exe 1664 igfxbm32.exe 1664 igfxbm32.exe 2864 igfxbm32.exe 2864 igfxbm32.exe 1048 igfxbm32.exe 1048 igfxbm32.exe 2116 igfxbm32.exe 2116 igfxbm32.exe 1792 igfxbm32.exe 1792 igfxbm32.exe 2004 igfxbm32.exe 2004 igfxbm32.exe 788 igfxbm32.exe 788 igfxbm32.exe 2020 igfxbm32.exe 2020 igfxbm32.exe 1000 igfxbm32.exe 1000 igfxbm32.exe 1632 igfxbm32.exe 1632 igfxbm32.exe 2016 igfxbm32.exe 2016 igfxbm32.exe 892 igfxbm32.exe 892 igfxbm32.exe 2688 igfxbm32.exe 2688 igfxbm32.exe 2784 igfxbm32.exe 2784 igfxbm32.exe 2128 igfxbm32.exe 2128 igfxbm32.exe 2696 igfxbm32.exe 2696 igfxbm32.exe 2608 igfxbm32.exe 2608 igfxbm32.exe 2152 igfxbm32.exe 2152 igfxbm32.exe 3008 igfxbm32.exe 3008 igfxbm32.exe 2156 igfxbm32.exe 2156 igfxbm32.exe 1764 igfxbm32.exe 1764 igfxbm32.exe 1636 igfxbm32.exe 1636 igfxbm32.exe 2856 igfxbm32.exe 2856 igfxbm32.exe 2860 igfxbm32.exe 2860 igfxbm32.exe 1124 igfxbm32.exe 1124 igfxbm32.exe 1896 igfxbm32.exe 1896 igfxbm32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum b0d9e6cdf8fc60a795fdff8a88e2b864_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 b0d9e6cdf8fc60a795fdff8a88e2b864_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe b0d9e6cdf8fc60a795fdff8a88e2b864_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxbm32.exe b0d9e6cdf8fc60a795fdff8a88e2b864_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe -
resource yara_rule behavioral1/memory/2272-0-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral1/files/0x00090000000120f9-6.dat upx behavioral1/memory/2820-22-0x0000000003410000-0x00000000034D0000-memory.dmp upx behavioral1/memory/2828-24-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral1/memory/2896-40-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral1/memory/1048-69-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral1/memory/2004-96-0x0000000003410000-0x00000000034D0000-memory.dmp upx behavioral1/memory/1000-115-0x0000000003700000-0x00000000037C0000-memory.dmp upx behavioral1/memory/892-127-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral1/memory/2608-139-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral1/memory/2156-149-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral1/memory/2856-154-0x0000000000400000-0x00000000004C0000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 45 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0d9e6cdf8fc60a795fdff8a88e2b864_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2272 b0d9e6cdf8fc60a795fdff8a88e2b864_JaffaCakes118.exe 2272 b0d9e6cdf8fc60a795fdff8a88e2b864_JaffaCakes118.exe 2820 igfxbm32.exe 2820 igfxbm32.exe 2828 igfxbm32.exe 2828 igfxbm32.exe 2224 igfxbm32.exe 2224 igfxbm32.exe 2896 igfxbm32.exe 2896 igfxbm32.exe 708 igfxbm32.exe 708 igfxbm32.exe 1664 igfxbm32.exe 1664 igfxbm32.exe 2864 igfxbm32.exe 2864 igfxbm32.exe 1048 igfxbm32.exe 1048 igfxbm32.exe 2116 igfxbm32.exe 2116 igfxbm32.exe 1792 igfxbm32.exe 1792 igfxbm32.exe 2004 igfxbm32.exe 2004 igfxbm32.exe 788 igfxbm32.exe 788 igfxbm32.exe 2020 igfxbm32.exe 2020 igfxbm32.exe 1000 igfxbm32.exe 1000 igfxbm32.exe 1632 igfxbm32.exe 1632 igfxbm32.exe 2016 igfxbm32.exe 2016 igfxbm32.exe 892 igfxbm32.exe 892 igfxbm32.exe 2688 igfxbm32.exe 2688 igfxbm32.exe 2784 igfxbm32.exe 2784 igfxbm32.exe 2128 igfxbm32.exe 2128 igfxbm32.exe 2696 igfxbm32.exe 2696 igfxbm32.exe 2608 igfxbm32.exe 2608 igfxbm32.exe 2152 igfxbm32.exe 2152 igfxbm32.exe 3008 igfxbm32.exe 3008 igfxbm32.exe 2156 igfxbm32.exe 2156 igfxbm32.exe 1764 igfxbm32.exe 1764 igfxbm32.exe 1636 igfxbm32.exe 1636 igfxbm32.exe 2856 igfxbm32.exe 2856 igfxbm32.exe 2860 igfxbm32.exe 2860 igfxbm32.exe 1124 igfxbm32.exe 1124 igfxbm32.exe 1896 igfxbm32.exe 1896 igfxbm32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2820 2272 b0d9e6cdf8fc60a795fdff8a88e2b864_JaffaCakes118.exe 31 PID 2272 wrote to memory of 2820 2272 b0d9e6cdf8fc60a795fdff8a88e2b864_JaffaCakes118.exe 31 PID 2272 wrote to memory of 2820 2272 b0d9e6cdf8fc60a795fdff8a88e2b864_JaffaCakes118.exe 31 PID 2272 wrote to memory of 2820 2272 b0d9e6cdf8fc60a795fdff8a88e2b864_JaffaCakes118.exe 31 PID 2820 wrote to memory of 2828 2820 igfxbm32.exe 32 PID 2820 wrote to memory of 2828 2820 igfxbm32.exe 32 PID 2820 wrote to memory of 2828 2820 igfxbm32.exe 32 PID 2820 wrote to memory of 2828 2820 igfxbm32.exe 32 PID 2828 wrote to memory of 2224 2828 igfxbm32.exe 33 PID 2828 wrote to memory of 2224 2828 igfxbm32.exe 33 PID 2828 wrote to memory of 2224 2828 igfxbm32.exe 33 PID 2828 wrote to memory of 2224 2828 igfxbm32.exe 33 PID 2224 wrote to memory of 2896 2224 igfxbm32.exe 34 PID 2224 wrote to memory of 2896 2224 igfxbm32.exe 34 PID 2224 wrote to memory of 2896 2224 igfxbm32.exe 34 PID 2224 wrote to memory of 2896 2224 igfxbm32.exe 34 PID 2896 wrote to memory of 708 2896 igfxbm32.exe 35 PID 2896 wrote to memory of 708 2896 igfxbm32.exe 35 PID 2896 wrote to memory of 708 2896 igfxbm32.exe 35 PID 2896 wrote to memory of 708 2896 igfxbm32.exe 35 PID 708 wrote to memory of 1664 708 igfxbm32.exe 36 PID 708 wrote to memory of 1664 708 igfxbm32.exe 36 PID 708 wrote to memory of 1664 708 igfxbm32.exe 36 PID 708 wrote to memory of 1664 708 igfxbm32.exe 36 PID 1664 wrote to memory of 2864 1664 igfxbm32.exe 37 PID 1664 wrote to memory of 2864 1664 igfxbm32.exe 37 PID 1664 wrote to memory of 2864 1664 igfxbm32.exe 37 PID 1664 wrote to memory of 2864 1664 igfxbm32.exe 37 PID 2864 wrote to memory of 1048 2864 igfxbm32.exe 38 PID 2864 wrote to memory of 1048 2864 igfxbm32.exe 38 PID 2864 wrote to memory of 1048 2864 igfxbm32.exe 38 PID 2864 wrote to memory of 1048 2864 igfxbm32.exe 38 PID 1048 wrote to memory of 2116 1048 igfxbm32.exe 39 PID 1048 wrote to memory of 2116 1048 igfxbm32.exe 39 PID 1048 wrote to memory of 2116 1048 igfxbm32.exe 39 PID 1048 wrote to memory of 2116 1048 igfxbm32.exe 39 PID 2116 wrote to memory of 1792 2116 igfxbm32.exe 40 PID 2116 wrote to memory of 1792 2116 igfxbm32.exe 40 PID 2116 wrote to memory of 1792 2116 igfxbm32.exe 40 PID 2116 wrote to memory of 1792 2116 igfxbm32.exe 40 PID 1792 wrote to memory of 2004 1792 igfxbm32.exe 41 PID 1792 wrote to memory of 2004 1792 igfxbm32.exe 41 PID 1792 wrote to memory of 2004 1792 igfxbm32.exe 41 PID 1792 wrote to memory of 2004 1792 igfxbm32.exe 41 PID 2004 wrote to memory of 788 2004 igfxbm32.exe 42 PID 2004 wrote to memory of 788 2004 igfxbm32.exe 42 PID 2004 wrote to memory of 788 2004 igfxbm32.exe 42 PID 2004 wrote to memory of 788 2004 igfxbm32.exe 42 PID 788 wrote to memory of 2020 788 igfxbm32.exe 43 PID 788 wrote to memory of 2020 788 igfxbm32.exe 43 PID 788 wrote to memory of 2020 788 igfxbm32.exe 43 PID 788 wrote to memory of 2020 788 igfxbm32.exe 43 PID 2020 wrote to memory of 1000 2020 igfxbm32.exe 44 PID 2020 wrote to memory of 1000 2020 igfxbm32.exe 44 PID 2020 wrote to memory of 1000 2020 igfxbm32.exe 44 PID 2020 wrote to memory of 1000 2020 igfxbm32.exe 44 PID 1000 wrote to memory of 1632 1000 igfxbm32.exe 45 PID 1000 wrote to memory of 1632 1000 igfxbm32.exe 45 PID 1000 wrote to memory of 1632 1000 igfxbm32.exe 45 PID 1000 wrote to memory of 1632 1000 igfxbm32.exe 45 PID 1632 wrote to memory of 2016 1632 igfxbm32.exe 46 PID 1632 wrote to memory of 2016 1632 igfxbm32.exe 46 PID 1632 wrote to memory of 2016 1632 igfxbm32.exe 46 PID 1632 wrote to memory of 2016 1632 igfxbm32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0d9e6cdf8fc60a795fdff8a88e2b864_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b0d9e6cdf8fc60a795fdff8a88e2b864_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Users\Admin\AppData\Local\Temp\B0D9E6~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2016 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:892 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2688 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2784 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2128 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2696 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2608 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2152 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3008 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2156 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1764 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1636 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2856 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2860 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1124 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1896 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1148 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1640 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1892 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2844 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1804 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1992 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1252 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2332 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1200 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2940 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2112 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2300 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2804
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD5b0d9e6cdf8fc60a795fdff8a88e2b864
SHA144114e50f546027281fce486ba905f2f27d77c84
SHA25616a6ddb6df051d58f9fbf3b3ad26790cb4816d29d5ce441dc78f47e23d7e994e
SHA51260458528522d9522cc342f5852e8e6cd602a58b3a718d6a5687b5b29f87b488d4eea6cbf664628380a4e67105a8870ec367cf3925b0fae2205f7318e7da8b4e3