Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 23:58
Static task
static1
Behavioral task
behavioral1
Sample
bacc6ba0024e93112bfbccea47c2dcc9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bacc6ba0024e93112bfbccea47c2dcc9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
bacc6ba0024e93112bfbccea47c2dcc9_JaffaCakes118.exe
-
Size
256KB
-
MD5
bacc6ba0024e93112bfbccea47c2dcc9
-
SHA1
61b715fa81014bff4e1ff61f17e410e4e71ac43e
-
SHA256
185ac0859f53e0e7b63b8b86ebe9f90c9493d6ea8998dc29650cccb3856181fb
-
SHA512
4f182b05908f758a4a52f84331856a680d78f2c29ae68bf0b1ead4011198e16b63134eb9d3299b5f2ddf27ea02429ddfa8d47a401e329c2298ed106664b72ba4
-
SSDEEP
6144:mpJ8jvef75RHaQPIBTBwi++M1+tDNfXlgNmxiIZx:mQmFRfwBGi+lwtDNf1gExiu
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2740 igfxdfb86.exe -
Executes dropped EXE 49 IoCs
pid Process 2740 igfxdfb86.exe 860 igfxdfb86.exe 1572 igfxdfb86.exe 2368 igfxdfb86.exe 3024 igfxdfb86.exe 2808 igfxdfb86.exe 3060 igfxdfb86.exe 1360 igfxdfb86.exe 2432 igfxdfb86.exe 2460 igfxdfb86.exe 1728 igfxdfb86.exe 1644 igfxdfb86.exe 1664 igfxdfb86.exe 980 igfxdfb86.exe 1544 igfxdfb86.exe 2284 igfxdfb86.exe 1496 igfxdfb86.exe 2604 igfxdfb86.exe 2600 igfxdfb86.exe 2316 igfxdfb86.exe 1780 igfxdfb86.exe 2848 igfxdfb86.exe 2772 igfxdfb86.exe 2368 igfxdfb86.exe 2868 igfxdfb86.exe 2556 igfxdfb86.exe 2196 igfxdfb86.exe 2280 igfxdfb86.exe 1480 igfxdfb86.exe 2552 igfxdfb86.exe 796 igfxdfb86.exe 1464 igfxdfb86.exe 1668 igfxdfb86.exe 1644 igfxdfb86.exe 772 igfxdfb86.exe 776 igfxdfb86.exe 1752 igfxdfb86.exe 2136 igfxdfb86.exe 2696 igfxdfb86.exe 2712 igfxdfb86.exe 2884 igfxdfb86.exe 600 igfxdfb86.exe 2524 igfxdfb86.exe 1572 igfxdfb86.exe 2572 igfxdfb86.exe 2928 igfxdfb86.exe 2980 igfxdfb86.exe 3048 igfxdfb86.exe 2172 igfxdfb86.exe -
Loads dropped DLL 64 IoCs
pid Process 2784 bacc6ba0024e93112bfbccea47c2dcc9_JaffaCakes118.exe 2784 bacc6ba0024e93112bfbccea47c2dcc9_JaffaCakes118.exe 2740 igfxdfb86.exe 2740 igfxdfb86.exe 860 igfxdfb86.exe 860 igfxdfb86.exe 1572 igfxdfb86.exe 1572 igfxdfb86.exe 2368 igfxdfb86.exe 2368 igfxdfb86.exe 3024 igfxdfb86.exe 3024 igfxdfb86.exe 2808 igfxdfb86.exe 2808 igfxdfb86.exe 3060 igfxdfb86.exe 3060 igfxdfb86.exe 1360 igfxdfb86.exe 1360 igfxdfb86.exe 2432 igfxdfb86.exe 2432 igfxdfb86.exe 2460 igfxdfb86.exe 2460 igfxdfb86.exe 1728 igfxdfb86.exe 1728 igfxdfb86.exe 1644 igfxdfb86.exe 1644 igfxdfb86.exe 1664 igfxdfb86.exe 1664 igfxdfb86.exe 980 igfxdfb86.exe 980 igfxdfb86.exe 1544 igfxdfb86.exe 1544 igfxdfb86.exe 2284 igfxdfb86.exe 2284 igfxdfb86.exe 1496 igfxdfb86.exe 1496 igfxdfb86.exe 2604 igfxdfb86.exe 2604 igfxdfb86.exe 2600 igfxdfb86.exe 2600 igfxdfb86.exe 2316 igfxdfb86.exe 2316 igfxdfb86.exe 1780 igfxdfb86.exe 1780 igfxdfb86.exe 2848 igfxdfb86.exe 2848 igfxdfb86.exe 2772 igfxdfb86.exe 2772 igfxdfb86.exe 2368 igfxdfb86.exe 2368 igfxdfb86.exe 2868 igfxdfb86.exe 2868 igfxdfb86.exe 2556 igfxdfb86.exe 2556 igfxdfb86.exe 2196 igfxdfb86.exe 2196 igfxdfb86.exe 2280 igfxdfb86.exe 2280 igfxdfb86.exe 1480 igfxdfb86.exe 1480 igfxdfb86.exe 2552 igfxdfb86.exe 2552 igfxdfb86.exe 796 igfxdfb86.exe 796 igfxdfb86.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum bacc6ba0024e93112bfbccea47c2dcc9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfb86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfb86.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File created C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\ igfxdfb86.exe File created C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File created C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File created C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\ igfxdfb86.exe File created C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File created C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\ igfxdfb86.exe File created C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File created C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File created C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\ igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\ igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\ igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File created C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File created C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\ igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\ igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\ igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\ igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File created C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File created C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File created C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\ igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\ igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\ igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File created C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\ igfxdfb86.exe File created C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\ igfxdfb86.exe File created C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\ igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File created C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\ igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File created C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\ igfxdfb86.exe File created C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File created C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\ igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\ igfxdfb86.exe File created C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\igfxdfb86.exe bacc6ba0024e93112bfbccea47c2dcc9_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\igfxdfb86.exe igfxdfb86.exe File opened for modification C:\Windows\SysWOW64\ igfxdfb86.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 49 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bacc6ba0024e93112bfbccea47c2dcc9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfb86.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2784 bacc6ba0024e93112bfbccea47c2dcc9_JaffaCakes118.exe 2784 bacc6ba0024e93112bfbccea47c2dcc9_JaffaCakes118.exe 2784 bacc6ba0024e93112bfbccea47c2dcc9_JaffaCakes118.exe 2784 bacc6ba0024e93112bfbccea47c2dcc9_JaffaCakes118.exe 2784 bacc6ba0024e93112bfbccea47c2dcc9_JaffaCakes118.exe 2784 bacc6ba0024e93112bfbccea47c2dcc9_JaffaCakes118.exe 2784 bacc6ba0024e93112bfbccea47c2dcc9_JaffaCakes118.exe 2784 bacc6ba0024e93112bfbccea47c2dcc9_JaffaCakes118.exe 2784 bacc6ba0024e93112bfbccea47c2dcc9_JaffaCakes118.exe 2784 bacc6ba0024e93112bfbccea47c2dcc9_JaffaCakes118.exe 2784 bacc6ba0024e93112bfbccea47c2dcc9_JaffaCakes118.exe 2784 bacc6ba0024e93112bfbccea47c2dcc9_JaffaCakes118.exe 2784 bacc6ba0024e93112bfbccea47c2dcc9_JaffaCakes118.exe 2784 bacc6ba0024e93112bfbccea47c2dcc9_JaffaCakes118.exe 2784 bacc6ba0024e93112bfbccea47c2dcc9_JaffaCakes118.exe 2784 bacc6ba0024e93112bfbccea47c2dcc9_JaffaCakes118.exe 2740 igfxdfb86.exe 2740 igfxdfb86.exe 2740 igfxdfb86.exe 2740 igfxdfb86.exe 2740 igfxdfb86.exe 2740 igfxdfb86.exe 2740 igfxdfb86.exe 2740 igfxdfb86.exe 2740 igfxdfb86.exe 2740 igfxdfb86.exe 2740 igfxdfb86.exe 2740 igfxdfb86.exe 2740 igfxdfb86.exe 2740 igfxdfb86.exe 2740 igfxdfb86.exe 2740 igfxdfb86.exe 860 igfxdfb86.exe 860 igfxdfb86.exe 860 igfxdfb86.exe 860 igfxdfb86.exe 860 igfxdfb86.exe 860 igfxdfb86.exe 860 igfxdfb86.exe 860 igfxdfb86.exe 860 igfxdfb86.exe 860 igfxdfb86.exe 860 igfxdfb86.exe 860 igfxdfb86.exe 860 igfxdfb86.exe 860 igfxdfb86.exe 860 igfxdfb86.exe 860 igfxdfb86.exe 1572 igfxdfb86.exe 1572 igfxdfb86.exe 1572 igfxdfb86.exe 1572 igfxdfb86.exe 1572 igfxdfb86.exe 1572 igfxdfb86.exe 1572 igfxdfb86.exe 1572 igfxdfb86.exe 1572 igfxdfb86.exe 1572 igfxdfb86.exe 1572 igfxdfb86.exe 1572 igfxdfb86.exe 1572 igfxdfb86.exe 1572 igfxdfb86.exe 1572 igfxdfb86.exe 1572 igfxdfb86.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2740 2784 bacc6ba0024e93112bfbccea47c2dcc9_JaffaCakes118.exe 30 PID 2784 wrote to memory of 2740 2784 bacc6ba0024e93112bfbccea47c2dcc9_JaffaCakes118.exe 30 PID 2784 wrote to memory of 2740 2784 bacc6ba0024e93112bfbccea47c2dcc9_JaffaCakes118.exe 30 PID 2784 wrote to memory of 2740 2784 bacc6ba0024e93112bfbccea47c2dcc9_JaffaCakes118.exe 30 PID 2740 wrote to memory of 860 2740 igfxdfb86.exe 31 PID 2740 wrote to memory of 860 2740 igfxdfb86.exe 31 PID 2740 wrote to memory of 860 2740 igfxdfb86.exe 31 PID 2740 wrote to memory of 860 2740 igfxdfb86.exe 31 PID 860 wrote to memory of 1572 860 igfxdfb86.exe 32 PID 860 wrote to memory of 1572 860 igfxdfb86.exe 32 PID 860 wrote to memory of 1572 860 igfxdfb86.exe 32 PID 860 wrote to memory of 1572 860 igfxdfb86.exe 32 PID 1572 wrote to memory of 2368 1572 igfxdfb86.exe 33 PID 1572 wrote to memory of 2368 1572 igfxdfb86.exe 33 PID 1572 wrote to memory of 2368 1572 igfxdfb86.exe 33 PID 1572 wrote to memory of 2368 1572 igfxdfb86.exe 33 PID 2368 wrote to memory of 3024 2368 igfxdfb86.exe 34 PID 2368 wrote to memory of 3024 2368 igfxdfb86.exe 34 PID 2368 wrote to memory of 3024 2368 igfxdfb86.exe 34 PID 2368 wrote to memory of 3024 2368 igfxdfb86.exe 34 PID 3024 wrote to memory of 2808 3024 igfxdfb86.exe 35 PID 3024 wrote to memory of 2808 3024 igfxdfb86.exe 35 PID 3024 wrote to memory of 2808 3024 igfxdfb86.exe 35 PID 3024 wrote to memory of 2808 3024 igfxdfb86.exe 35 PID 2808 wrote to memory of 3060 2808 igfxdfb86.exe 36 PID 2808 wrote to memory of 3060 2808 igfxdfb86.exe 36 PID 2808 wrote to memory of 3060 2808 igfxdfb86.exe 36 PID 2808 wrote to memory of 3060 2808 igfxdfb86.exe 36 PID 3060 wrote to memory of 1360 3060 igfxdfb86.exe 38 PID 3060 wrote to memory of 1360 3060 igfxdfb86.exe 38 PID 3060 wrote to memory of 1360 3060 igfxdfb86.exe 38 PID 3060 wrote to memory of 1360 3060 igfxdfb86.exe 38 PID 1360 wrote to memory of 2432 1360 igfxdfb86.exe 39 PID 1360 wrote to memory of 2432 1360 igfxdfb86.exe 39 PID 1360 wrote to memory of 2432 1360 igfxdfb86.exe 39 PID 1360 wrote to memory of 2432 1360 igfxdfb86.exe 39 PID 2432 wrote to memory of 2460 2432 igfxdfb86.exe 40 PID 2432 wrote to memory of 2460 2432 igfxdfb86.exe 40 PID 2432 wrote to memory of 2460 2432 igfxdfb86.exe 40 PID 2432 wrote to memory of 2460 2432 igfxdfb86.exe 40 PID 2460 wrote to memory of 1728 2460 igfxdfb86.exe 41 PID 2460 wrote to memory of 1728 2460 igfxdfb86.exe 41 PID 2460 wrote to memory of 1728 2460 igfxdfb86.exe 41 PID 2460 wrote to memory of 1728 2460 igfxdfb86.exe 41 PID 1728 wrote to memory of 1644 1728 igfxdfb86.exe 42 PID 1728 wrote to memory of 1644 1728 igfxdfb86.exe 42 PID 1728 wrote to memory of 1644 1728 igfxdfb86.exe 42 PID 1728 wrote to memory of 1644 1728 igfxdfb86.exe 42 PID 1644 wrote to memory of 1664 1644 igfxdfb86.exe 43 PID 1644 wrote to memory of 1664 1644 igfxdfb86.exe 43 PID 1644 wrote to memory of 1664 1644 igfxdfb86.exe 43 PID 1644 wrote to memory of 1664 1644 igfxdfb86.exe 43 PID 1664 wrote to memory of 980 1664 igfxdfb86.exe 44 PID 1664 wrote to memory of 980 1664 igfxdfb86.exe 44 PID 1664 wrote to memory of 980 1664 igfxdfb86.exe 44 PID 1664 wrote to memory of 980 1664 igfxdfb86.exe 44 PID 980 wrote to memory of 1544 980 igfxdfb86.exe 45 PID 980 wrote to memory of 1544 980 igfxdfb86.exe 45 PID 980 wrote to memory of 1544 980 igfxdfb86.exe 45 PID 980 wrote to memory of 1544 980 igfxdfb86.exe 45 PID 1544 wrote to memory of 2284 1544 igfxdfb86.exe 46 PID 1544 wrote to memory of 2284 1544 igfxdfb86.exe 46 PID 1544 wrote to memory of 2284 1544 igfxdfb86.exe 46 PID 1544 wrote to memory of 2284 1544 igfxdfb86.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\bacc6ba0024e93112bfbccea47c2dcc9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bacc6ba0024e93112bfbccea47c2dcc9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Users\Admin\AppData\Local\Temp\BACC6B~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2284 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1496 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2604 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2600 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2316 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1780 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2848 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2772 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2368 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2868 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2556 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2196 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2280 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1480 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2552 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:796 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1464 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1668 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1644 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:772 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:776 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1752 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE39⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2136 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2696 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2712 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2884 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:600 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2524 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1572 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2572 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2928 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2980 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE49⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3048 -
C:\Windows\SysWOW64\igfxdfb86.exe"C:\Windows\system32\igfxdfb86.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE50⤵
- Executes dropped EXE
- Maps connected drives based on registry
PID:2172
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5bacc6ba0024e93112bfbccea47c2dcc9
SHA161b715fa81014bff4e1ff61f17e410e4e71ac43e
SHA256185ac0859f53e0e7b63b8b86ebe9f90c9493d6ea8998dc29650cccb3856181fb
SHA5124f182b05908f758a4a52f84331856a680d78f2c29ae68bf0b1ead4011198e16b63134eb9d3299b5f2ddf27ea02429ddfa8d47a401e329c2298ed106664b72ba4