Analysis
-
max time kernel
149s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 06:34
Behavioral task
behavioral1
Sample
bc1eab92bebb47e47c704aac84b35e68_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
bc1eab92bebb47e47c704aac84b35e68_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
bc1eab92bebb47e47c704aac84b35e68
-
SHA1
3b6009f45154d7e6cd201557a17eb693278d3eaa
-
SHA256
2a25e14dfbb655c66ca7665e594d545cb05932ac027319d1726385fb5dae0c6c
-
SHA512
08f9d1d0a177550e8be3628ce39b26fa3210465606dcae6d4c87eff51b17fbd99b348d71a843eed1935e66f97f0c0de9d83b029d069b18c2fef44e44ae1b45f0
-
SSDEEP
6144:O9UaIuFpuvGr5ojjc6sdV0x9Bwb47nTplvV3D77eraR:zQUC6sdWXBIknTplt3DveraR
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2788 igfxsm32.exe -
Executes dropped EXE 45 IoCs
pid Process 2788 igfxsm32.exe 2732 igfxsm32.exe 2712 igfxsm32.exe 2280 igfxsm32.exe 2028 igfxsm32.exe 2120 igfxsm32.exe 2456 igfxsm32.exe 652 igfxsm32.exe 236 igfxsm32.exe 1256 igfxsm32.exe 2516 igfxsm32.exe 2380 igfxsm32.exe 2588 igfxsm32.exe 1812 igfxsm32.exe 1740 igfxsm32.exe 1628 igfxsm32.exe 2172 igfxsm32.exe 1708 igfxsm32.exe 2524 igfxsm32.exe 2852 igfxsm32.exe 3032 igfxsm32.exe 2772 igfxsm32.exe 2708 igfxsm32.exe 3028 igfxsm32.exe 2264 igfxsm32.exe 2116 igfxsm32.exe 3036 igfxsm32.exe 1656 igfxsm32.exe 2456 igfxsm32.exe 608 igfxsm32.exe 2220 igfxsm32.exe 2428 igfxsm32.exe 2228 igfxsm32.exe 2164 igfxsm32.exe 1660 igfxsm32.exe 2544 igfxsm32.exe 2504 igfxsm32.exe 1076 igfxsm32.exe 2368 igfxsm32.exe 2320 igfxsm32.exe 1520 igfxsm32.exe 3008 igfxsm32.exe 1028 igfxsm32.exe 1952 igfxsm32.exe 3024 igfxsm32.exe -
Loads dropped DLL 64 IoCs
pid Process 1364 bc1eab92bebb47e47c704aac84b35e68_JaffaCakes118.exe 1364 bc1eab92bebb47e47c704aac84b35e68_JaffaCakes118.exe 2788 igfxsm32.exe 2788 igfxsm32.exe 2732 igfxsm32.exe 2732 igfxsm32.exe 2712 igfxsm32.exe 2712 igfxsm32.exe 2280 igfxsm32.exe 2280 igfxsm32.exe 2028 igfxsm32.exe 2028 igfxsm32.exe 2120 igfxsm32.exe 2120 igfxsm32.exe 2456 igfxsm32.exe 2456 igfxsm32.exe 652 igfxsm32.exe 652 igfxsm32.exe 236 igfxsm32.exe 236 igfxsm32.exe 1256 igfxsm32.exe 1256 igfxsm32.exe 2516 igfxsm32.exe 2516 igfxsm32.exe 2380 igfxsm32.exe 2380 igfxsm32.exe 2588 igfxsm32.exe 2588 igfxsm32.exe 1812 igfxsm32.exe 1812 igfxsm32.exe 1740 igfxsm32.exe 1740 igfxsm32.exe 1628 igfxsm32.exe 1628 igfxsm32.exe 2172 igfxsm32.exe 2172 igfxsm32.exe 1708 igfxsm32.exe 1708 igfxsm32.exe 2524 igfxsm32.exe 2524 igfxsm32.exe 2852 igfxsm32.exe 2852 igfxsm32.exe 3032 igfxsm32.exe 3032 igfxsm32.exe 2772 igfxsm32.exe 2772 igfxsm32.exe 2708 igfxsm32.exe 2708 igfxsm32.exe 3028 igfxsm32.exe 3028 igfxsm32.exe 2264 igfxsm32.exe 2264 igfxsm32.exe 2116 igfxsm32.exe 2116 igfxsm32.exe 3036 igfxsm32.exe 3036 igfxsm32.exe 1656 igfxsm32.exe 1656 igfxsm32.exe 2456 igfxsm32.exe 2456 igfxsm32.exe 608 igfxsm32.exe 608 igfxsm32.exe 2220 igfxsm32.exe 2220 igfxsm32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum bc1eab92bebb47e47c704aac84b35e68_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsm32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxsm32.exe File opened for modification C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File opened for modification C:\Windows\SysWOW64\ igfxsm32.exe File opened for modification C:\Windows\SysWOW64\ igfxsm32.exe File created C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File created C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File opened for modification C:\Windows\SysWOW64\ igfxsm32.exe File opened for modification C:\Windows\SysWOW64\ igfxsm32.exe File created C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File opened for modification C:\Windows\SysWOW64\ igfxsm32.exe File created C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File opened for modification C:\Windows\SysWOW64\ igfxsm32.exe File created C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File opened for modification C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File opened for modification C:\Windows\SysWOW64\ igfxsm32.exe File created C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File opened for modification C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File created C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File opened for modification C:\Windows\SysWOW64\ igfxsm32.exe File created C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File created C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File opened for modification C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File created C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File opened for modification C:\Windows\SysWOW64\ igfxsm32.exe File created C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File opened for modification C:\Windows\SysWOW64\ igfxsm32.exe File created C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File created C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File opened for modification C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File created C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File created C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File opened for modification C:\Windows\SysWOW64\ igfxsm32.exe File opened for modification C:\Windows\SysWOW64\ igfxsm32.exe File opened for modification C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File opened for modification C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File opened for modification C:\Windows\SysWOW64\ igfxsm32.exe File opened for modification C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File opened for modification C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File opened for modification C:\Windows\SysWOW64\ igfxsm32.exe File created C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File created C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File opened for modification C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File created C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File created C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File opened for modification C:\Windows\SysWOW64\ igfxsm32.exe File created C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File opened for modification C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File created C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File opened for modification C:\Windows\SysWOW64\ igfxsm32.exe File created C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File opened for modification C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File opened for modification C:\Windows\SysWOW64\ igfxsm32.exe File opened for modification C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File opened for modification C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File opened for modification C:\Windows\SysWOW64\ igfxsm32.exe File opened for modification C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File opened for modification C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File opened for modification C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File opened for modification C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File created C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File created C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe File opened for modification C:\Windows\SysWOW64\ igfxsm32.exe File opened for modification C:\Windows\SysWOW64\ igfxsm32.exe File created C:\Windows\SysWOW64\igfxsm32.exe igfxsm32.exe -
resource yara_rule behavioral1/memory/1364-0-0x0000000013110000-0x00000000131E6000-memory.dmp upx behavioral1/files/0x00080000000120fe-5.dat upx behavioral1/memory/2788-14-0x0000000013110000-0x00000000131E6000-memory.dmp upx behavioral1/memory/2732-24-0x0000000013110000-0x00000000131E6000-memory.dmp upx behavioral1/memory/2280-41-0x0000000013110000-0x00000000131E6000-memory.dmp upx behavioral1/memory/2280-46-0x0000000003780000-0x0000000003856000-memory.dmp upx behavioral1/memory/236-73-0x0000000013110000-0x00000000131E6000-memory.dmp upx behavioral1/memory/1256-79-0x0000000013110000-0x00000000131E6000-memory.dmp upx behavioral1/memory/2264-152-0x0000000013110000-0x00000000131E6000-memory.dmp upx behavioral1/memory/3036-160-0x0000000003730000-0x0000000003806000-memory.dmp upx behavioral1/memory/1076-190-0x00000000036D0000-0x00000000037A6000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 46 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc1eab92bebb47e47c704aac84b35e68_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsm32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1364 bc1eab92bebb47e47c704aac84b35e68_JaffaCakes118.exe 1364 bc1eab92bebb47e47c704aac84b35e68_JaffaCakes118.exe 2788 igfxsm32.exe 2788 igfxsm32.exe 2732 igfxsm32.exe 2732 igfxsm32.exe 2712 igfxsm32.exe 2712 igfxsm32.exe 2280 igfxsm32.exe 2280 igfxsm32.exe 2028 igfxsm32.exe 2028 igfxsm32.exe 2120 igfxsm32.exe 2120 igfxsm32.exe 2456 igfxsm32.exe 2456 igfxsm32.exe 652 igfxsm32.exe 652 igfxsm32.exe 236 igfxsm32.exe 236 igfxsm32.exe 1256 igfxsm32.exe 1256 igfxsm32.exe 2516 igfxsm32.exe 2516 igfxsm32.exe 2380 igfxsm32.exe 2380 igfxsm32.exe 2588 igfxsm32.exe 2588 igfxsm32.exe 1812 igfxsm32.exe 1812 igfxsm32.exe 1740 igfxsm32.exe 1740 igfxsm32.exe 1628 igfxsm32.exe 1628 igfxsm32.exe 2172 igfxsm32.exe 2172 igfxsm32.exe 1708 igfxsm32.exe 1708 igfxsm32.exe 2524 igfxsm32.exe 2524 igfxsm32.exe 2852 igfxsm32.exe 2852 igfxsm32.exe 3032 igfxsm32.exe 3032 igfxsm32.exe 2772 igfxsm32.exe 2772 igfxsm32.exe 2708 igfxsm32.exe 2708 igfxsm32.exe 3028 igfxsm32.exe 3028 igfxsm32.exe 2264 igfxsm32.exe 2264 igfxsm32.exe 2116 igfxsm32.exe 2116 igfxsm32.exe 3036 igfxsm32.exe 3036 igfxsm32.exe 1656 igfxsm32.exe 1656 igfxsm32.exe 2456 igfxsm32.exe 2456 igfxsm32.exe 608 igfxsm32.exe 608 igfxsm32.exe 2220 igfxsm32.exe 2220 igfxsm32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1364 wrote to memory of 2788 1364 bc1eab92bebb47e47c704aac84b35e68_JaffaCakes118.exe 30 PID 1364 wrote to memory of 2788 1364 bc1eab92bebb47e47c704aac84b35e68_JaffaCakes118.exe 30 PID 1364 wrote to memory of 2788 1364 bc1eab92bebb47e47c704aac84b35e68_JaffaCakes118.exe 30 PID 1364 wrote to memory of 2788 1364 bc1eab92bebb47e47c704aac84b35e68_JaffaCakes118.exe 30 PID 2788 wrote to memory of 2732 2788 igfxsm32.exe 31 PID 2788 wrote to memory of 2732 2788 igfxsm32.exe 31 PID 2788 wrote to memory of 2732 2788 igfxsm32.exe 31 PID 2788 wrote to memory of 2732 2788 igfxsm32.exe 31 PID 2732 wrote to memory of 2712 2732 igfxsm32.exe 32 PID 2732 wrote to memory of 2712 2732 igfxsm32.exe 32 PID 2732 wrote to memory of 2712 2732 igfxsm32.exe 32 PID 2732 wrote to memory of 2712 2732 igfxsm32.exe 32 PID 2712 wrote to memory of 2280 2712 igfxsm32.exe 33 PID 2712 wrote to memory of 2280 2712 igfxsm32.exe 33 PID 2712 wrote to memory of 2280 2712 igfxsm32.exe 33 PID 2712 wrote to memory of 2280 2712 igfxsm32.exe 33 PID 2280 wrote to memory of 2028 2280 igfxsm32.exe 34 PID 2280 wrote to memory of 2028 2280 igfxsm32.exe 34 PID 2280 wrote to memory of 2028 2280 igfxsm32.exe 34 PID 2280 wrote to memory of 2028 2280 igfxsm32.exe 34 PID 2028 wrote to memory of 2120 2028 igfxsm32.exe 35 PID 2028 wrote to memory of 2120 2028 igfxsm32.exe 35 PID 2028 wrote to memory of 2120 2028 igfxsm32.exe 35 PID 2028 wrote to memory of 2120 2028 igfxsm32.exe 35 PID 2120 wrote to memory of 2456 2120 igfxsm32.exe 36 PID 2120 wrote to memory of 2456 2120 igfxsm32.exe 36 PID 2120 wrote to memory of 2456 2120 igfxsm32.exe 36 PID 2120 wrote to memory of 2456 2120 igfxsm32.exe 36 PID 2456 wrote to memory of 652 2456 igfxsm32.exe 37 PID 2456 wrote to memory of 652 2456 igfxsm32.exe 37 PID 2456 wrote to memory of 652 2456 igfxsm32.exe 37 PID 2456 wrote to memory of 652 2456 igfxsm32.exe 37 PID 652 wrote to memory of 236 652 igfxsm32.exe 38 PID 652 wrote to memory of 236 652 igfxsm32.exe 38 PID 652 wrote to memory of 236 652 igfxsm32.exe 38 PID 652 wrote to memory of 236 652 igfxsm32.exe 38 PID 236 wrote to memory of 1256 236 igfxsm32.exe 39 PID 236 wrote to memory of 1256 236 igfxsm32.exe 39 PID 236 wrote to memory of 1256 236 igfxsm32.exe 39 PID 236 wrote to memory of 1256 236 igfxsm32.exe 39 PID 1256 wrote to memory of 2516 1256 igfxsm32.exe 40 PID 1256 wrote to memory of 2516 1256 igfxsm32.exe 40 PID 1256 wrote to memory of 2516 1256 igfxsm32.exe 40 PID 1256 wrote to memory of 2516 1256 igfxsm32.exe 40 PID 2516 wrote to memory of 2380 2516 igfxsm32.exe 41 PID 2516 wrote to memory of 2380 2516 igfxsm32.exe 41 PID 2516 wrote to memory of 2380 2516 igfxsm32.exe 41 PID 2516 wrote to memory of 2380 2516 igfxsm32.exe 41 PID 2380 wrote to memory of 2588 2380 igfxsm32.exe 42 PID 2380 wrote to memory of 2588 2380 igfxsm32.exe 42 PID 2380 wrote to memory of 2588 2380 igfxsm32.exe 42 PID 2380 wrote to memory of 2588 2380 igfxsm32.exe 42 PID 2588 wrote to memory of 1812 2588 igfxsm32.exe 43 PID 2588 wrote to memory of 1812 2588 igfxsm32.exe 43 PID 2588 wrote to memory of 1812 2588 igfxsm32.exe 43 PID 2588 wrote to memory of 1812 2588 igfxsm32.exe 43 PID 1812 wrote to memory of 1740 1812 igfxsm32.exe 44 PID 1812 wrote to memory of 1740 1812 igfxsm32.exe 44 PID 1812 wrote to memory of 1740 1812 igfxsm32.exe 44 PID 1812 wrote to memory of 1740 1812 igfxsm32.exe 44 PID 1740 wrote to memory of 1628 1740 igfxsm32.exe 45 PID 1740 wrote to memory of 1628 1740 igfxsm32.exe 45 PID 1740 wrote to memory of 1628 1740 igfxsm32.exe 45 PID 1740 wrote to memory of 1628 1740 igfxsm32.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc1eab92bebb47e47c704aac84b35e68_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bc1eab92bebb47e47c704aac84b35e68_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Users\Admin\AppData\Local\Temp\BC1EAB~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1628 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2172 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1708 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2524 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2852 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3032 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2772 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2708 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3028 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2264 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2116 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3036 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1656 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2456 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:608 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2220 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2428 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2228 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2164 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1660 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2544 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2504 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1076 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2368 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2320 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1520 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3008 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1028 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1952 -
C:\Windows\SysWOW64\igfxsm32.exe"C:\Windows\system32\igfxsm32.exe" C:\Windows\SysWOW64\igfxsm32.exe46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3024
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5bc1eab92bebb47e47c704aac84b35e68
SHA13b6009f45154d7e6cd201557a17eb693278d3eaa
SHA2562a25e14dfbb655c66ca7665e594d545cb05932ac027319d1726385fb5dae0c6c
SHA51208f9d1d0a177550e8be3628ce39b26fa3210465606dcae6d4c87eff51b17fbd99b348d71a843eed1935e66f97f0c0de9d83b029d069b18c2fef44e44ae1b45f0