Analysis
-
max time kernel
149s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 11:39
Static task
static1
Behavioral task
behavioral1
Sample
bd37420c2343dfdf731f1c1fcbecf7d8_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bd37420c2343dfdf731f1c1fcbecf7d8_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
bd37420c2343dfdf731f1c1fcbecf7d8_JaffaCakes118.exe
-
Size
224KB
-
MD5
bd37420c2343dfdf731f1c1fcbecf7d8
-
SHA1
80131b92654433b97334e7696d94e982faae38ab
-
SHA256
1051c309491d28d37f2cd428b3ce112ae632f7a343da0a0b0a69bc24c47d9f55
-
SHA512
5879ade106a7ccfd5c1ca85b13e95b95603a915ed3cedf9576b14eba0f377813941fe5d148e75ef8d5f9b4cac61ae1ee60fc5b99f54db516d613fe6c2918b46e
-
SSDEEP
3072:vkMlKwjJUHo0lg7F+88Q0B/tAa+GAfoG+SP8/4qAzEGtU0o6GSgpks4sIkxV3iI4:M+nSu0J/tahD+Sx7tEsgpNiImf
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2748 igfxwp32.exe -
Executes dropped EXE 64 IoCs
pid Process 2728 igfxwp32.exe 2748 igfxwp32.exe 2700 igfxwp32.exe 2652 igfxwp32.exe 2000 igfxwp32.exe 2104 igfxwp32.exe 3044 igfxwp32.exe 3032 igfxwp32.exe 396 igfxwp32.exe 1704 igfxwp32.exe 2980 igfxwp32.exe 2216 igfxwp32.exe 596 igfxwp32.exe 1880 igfxwp32.exe 1480 igfxwp32.exe 2032 igfxwp32.exe 600 igfxwp32.exe 576 igfxwp32.exe 1568 igfxwp32.exe 1580 igfxwp32.exe 2312 igfxwp32.exe 2408 igfxwp32.exe 2676 igfxwp32.exe 2788 igfxwp32.exe 2632 igfxwp32.exe 2024 igfxwp32.exe 1792 igfxwp32.exe 2144 igfxwp32.exe 1648 igfxwp32.exe 2308 igfxwp32.exe 1088 igfxwp32.exe 2924 igfxwp32.exe 1684 igfxwp32.exe 1136 igfxwp32.exe 2968 igfxwp32.exe 2468 igfxwp32.exe 2544 igfxwp32.exe 2184 igfxwp32.exe 1528 igfxwp32.exe 1436 igfxwp32.exe 904 igfxwp32.exe 2324 igfxwp32.exe 2268 igfxwp32.exe 864 igfxwp32.exe 348 igfxwp32.exe 2680 igfxwp32.exe 2844 igfxwp32.exe 2624 igfxwp32.exe 2600 igfxwp32.exe 2620 igfxwp32.exe 2664 igfxwp32.exe 2460 igfxwp32.exe 2456 igfxwp32.exe 1632 igfxwp32.exe 2796 igfxwp32.exe 2764 igfxwp32.exe 964 igfxwp32.exe 396 igfxwp32.exe 988 igfxwp32.exe 1732 igfxwp32.exe 1776 igfxwp32.exe 680 igfxwp32.exe 2292 igfxwp32.exe 1260 igfxwp32.exe -
Loads dropped DLL 64 IoCs
pid Process 2512 bd37420c2343dfdf731f1c1fcbecf7d8_JaffaCakes118.exe 2512 bd37420c2343dfdf731f1c1fcbecf7d8_JaffaCakes118.exe 2728 igfxwp32.exe 2728 igfxwp32.exe 2748 igfxwp32.exe 2748 igfxwp32.exe 2700 igfxwp32.exe 2700 igfxwp32.exe 2652 igfxwp32.exe 2652 igfxwp32.exe 2000 igfxwp32.exe 2000 igfxwp32.exe 2104 igfxwp32.exe 2104 igfxwp32.exe 3044 igfxwp32.exe 3044 igfxwp32.exe 3032 igfxwp32.exe 3032 igfxwp32.exe 396 igfxwp32.exe 396 igfxwp32.exe 1704 igfxwp32.exe 1704 igfxwp32.exe 2980 igfxwp32.exe 2980 igfxwp32.exe 2216 igfxwp32.exe 2216 igfxwp32.exe 596 igfxwp32.exe 596 igfxwp32.exe 1880 igfxwp32.exe 1880 igfxwp32.exe 1480 igfxwp32.exe 1480 igfxwp32.exe 2032 igfxwp32.exe 2032 igfxwp32.exe 600 igfxwp32.exe 600 igfxwp32.exe 576 igfxwp32.exe 576 igfxwp32.exe 1568 igfxwp32.exe 1568 igfxwp32.exe 1580 igfxwp32.exe 1580 igfxwp32.exe 2312 igfxwp32.exe 2312 igfxwp32.exe 2408 igfxwp32.exe 2408 igfxwp32.exe 2676 igfxwp32.exe 2676 igfxwp32.exe 2788 igfxwp32.exe 2788 igfxwp32.exe 2632 igfxwp32.exe 2632 igfxwp32.exe 2024 igfxwp32.exe 2024 igfxwp32.exe 1792 igfxwp32.exe 1792 igfxwp32.exe 2144 igfxwp32.exe 2144 igfxwp32.exe 1648 igfxwp32.exe 1648 igfxwp32.exe 2308 igfxwp32.exe 2308 igfxwp32.exe 1088 igfxwp32.exe 1088 igfxwp32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 bd37420c2343dfdf731f1c1fcbecf7d8_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe bd37420c2343dfdf731f1c1fcbecf7d8_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ bd37420c2343dfdf731f1c1fcbecf7d8_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe -
Suspicious use of SetThreadContext 38 IoCs
description pid Process procid_target PID 2532 set thread context of 2512 2532 bd37420c2343dfdf731f1c1fcbecf7d8_JaffaCakes118.exe 29 PID 2728 set thread context of 2748 2728 igfxwp32.exe 31 PID 2700 set thread context of 2652 2700 igfxwp32.exe 33 PID 2000 set thread context of 2104 2000 igfxwp32.exe 35 PID 3044 set thread context of 3032 3044 igfxwp32.exe 37 PID 396 set thread context of 1704 396 igfxwp32.exe 39 PID 2980 set thread context of 2216 2980 igfxwp32.exe 41 PID 596 set thread context of 1880 596 igfxwp32.exe 43 PID 1480 set thread context of 2032 1480 igfxwp32.exe 45 PID 600 set thread context of 576 600 igfxwp32.exe 47 PID 1568 set thread context of 1580 1568 igfxwp32.exe 49 PID 2312 set thread context of 2408 2312 igfxwp32.exe 51 PID 2676 set thread context of 2788 2676 igfxwp32.exe 53 PID 2632 set thread context of 2024 2632 igfxwp32.exe 55 PID 1792 set thread context of 2144 1792 igfxwp32.exe 57 PID 1648 set thread context of 2308 1648 igfxwp32.exe 59 PID 1088 set thread context of 2924 1088 igfxwp32.exe 61 PID 1684 set thread context of 1136 1684 igfxwp32.exe 63 PID 2968 set thread context of 2468 2968 igfxwp32.exe 65 PID 2544 set thread context of 2184 2544 igfxwp32.exe 67 PID 1528 set thread context of 1436 1528 igfxwp32.exe 69 PID 904 set thread context of 2324 904 igfxwp32.exe 71 PID 2268 set thread context of 864 2268 igfxwp32.exe 73 PID 348 set thread context of 2680 348 igfxwp32.exe 75 PID 2844 set thread context of 2624 2844 igfxwp32.exe 77 PID 2600 set thread context of 2620 2600 igfxwp32.exe 79 PID 2664 set thread context of 2460 2664 igfxwp32.exe 81 PID 2456 set thread context of 1632 2456 igfxwp32.exe 83 PID 2796 set thread context of 2764 2796 igfxwp32.exe 85 PID 964 set thread context of 396 964 igfxwp32.exe 87 PID 988 set thread context of 1732 988 igfxwp32.exe 89 PID 1776 set thread context of 680 1776 igfxwp32.exe 91 PID 2292 set thread context of 1260 2292 igfxwp32.exe 93 PID 960 set thread context of 628 960 igfxwp32.exe 95 PID 600 set thread context of 2092 600 igfxwp32.exe 97 PID 2120 set thread context of 2336 2120 igfxwp32.exe 99 PID 2328 set thread context of 2412 2328 igfxwp32.exe 101 PID 2780 set thread context of 2644 2780 igfxwp32.exe 103 -
resource yara_rule behavioral1/memory/2512-2-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2512-10-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2512-11-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2512-9-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2512-8-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2512-6-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2512-4-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2512-24-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2748-38-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2748-37-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2748-36-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2748-35-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2748-44-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2652-57-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2652-64-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2104-77-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2104-84-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/3032-95-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/3032-97-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/3032-96-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/3032-103-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1704-116-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1704-123-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2216-136-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2216-141-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1880-155-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1880-162-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2032-175-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2032-180-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/576-194-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/576-199-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1580-210-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1580-214-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2408-224-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2408-227-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2788-237-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2788-240-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2024-250-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2024-253-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2144-263-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2144-266-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2308-276-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2308-279-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2924-289-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2924-292-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1136-302-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1136-305-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2468-315-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2468-318-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2184-328-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2184-331-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1436-341-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1436-344-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2324-353-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2324-357-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/864-366-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/864-370-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2680-380-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2680-383-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2624-393-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2624-396-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2620-406-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2620-409-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2460-418-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd37420c2343dfdf731f1c1fcbecf7d8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd37420c2343dfdf731f1c1fcbecf7d8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2512 bd37420c2343dfdf731f1c1fcbecf7d8_JaffaCakes118.exe 2512 bd37420c2343dfdf731f1c1fcbecf7d8_JaffaCakes118.exe 2748 igfxwp32.exe 2748 igfxwp32.exe 2652 igfxwp32.exe 2652 igfxwp32.exe 2104 igfxwp32.exe 2104 igfxwp32.exe 3032 igfxwp32.exe 3032 igfxwp32.exe 1704 igfxwp32.exe 1704 igfxwp32.exe 2216 igfxwp32.exe 2216 igfxwp32.exe 1880 igfxwp32.exe 1880 igfxwp32.exe 2032 igfxwp32.exe 2032 igfxwp32.exe 576 igfxwp32.exe 576 igfxwp32.exe 1580 igfxwp32.exe 1580 igfxwp32.exe 2408 igfxwp32.exe 2408 igfxwp32.exe 2788 igfxwp32.exe 2788 igfxwp32.exe 2024 igfxwp32.exe 2024 igfxwp32.exe 2144 igfxwp32.exe 2144 igfxwp32.exe 2308 igfxwp32.exe 2308 igfxwp32.exe 2924 igfxwp32.exe 2924 igfxwp32.exe 1136 igfxwp32.exe 1136 igfxwp32.exe 2468 igfxwp32.exe 2468 igfxwp32.exe 2184 igfxwp32.exe 2184 igfxwp32.exe 1436 igfxwp32.exe 1436 igfxwp32.exe 2324 igfxwp32.exe 2324 igfxwp32.exe 864 igfxwp32.exe 864 igfxwp32.exe 2680 igfxwp32.exe 2680 igfxwp32.exe 2624 igfxwp32.exe 2624 igfxwp32.exe 2620 igfxwp32.exe 2620 igfxwp32.exe 2460 igfxwp32.exe 2460 igfxwp32.exe 1632 igfxwp32.exe 1632 igfxwp32.exe 2764 igfxwp32.exe 2764 igfxwp32.exe 396 igfxwp32.exe 396 igfxwp32.exe 1732 igfxwp32.exe 1732 igfxwp32.exe 680 igfxwp32.exe 680 igfxwp32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2512 2532 bd37420c2343dfdf731f1c1fcbecf7d8_JaffaCakes118.exe 29 PID 2532 wrote to memory of 2512 2532 bd37420c2343dfdf731f1c1fcbecf7d8_JaffaCakes118.exe 29 PID 2532 wrote to memory of 2512 2532 bd37420c2343dfdf731f1c1fcbecf7d8_JaffaCakes118.exe 29 PID 2532 wrote to memory of 2512 2532 bd37420c2343dfdf731f1c1fcbecf7d8_JaffaCakes118.exe 29 PID 2532 wrote to memory of 2512 2532 bd37420c2343dfdf731f1c1fcbecf7d8_JaffaCakes118.exe 29 PID 2532 wrote to memory of 2512 2532 bd37420c2343dfdf731f1c1fcbecf7d8_JaffaCakes118.exe 29 PID 2532 wrote to memory of 2512 2532 bd37420c2343dfdf731f1c1fcbecf7d8_JaffaCakes118.exe 29 PID 2512 wrote to memory of 2728 2512 bd37420c2343dfdf731f1c1fcbecf7d8_JaffaCakes118.exe 30 PID 2512 wrote to memory of 2728 2512 bd37420c2343dfdf731f1c1fcbecf7d8_JaffaCakes118.exe 30 PID 2512 wrote to memory of 2728 2512 bd37420c2343dfdf731f1c1fcbecf7d8_JaffaCakes118.exe 30 PID 2512 wrote to memory of 2728 2512 bd37420c2343dfdf731f1c1fcbecf7d8_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2748 2728 igfxwp32.exe 31 PID 2728 wrote to memory of 2748 2728 igfxwp32.exe 31 PID 2728 wrote to memory of 2748 2728 igfxwp32.exe 31 PID 2728 wrote to memory of 2748 2728 igfxwp32.exe 31 PID 2728 wrote to memory of 2748 2728 igfxwp32.exe 31 PID 2728 wrote to memory of 2748 2728 igfxwp32.exe 31 PID 2728 wrote to memory of 2748 2728 igfxwp32.exe 31 PID 2748 wrote to memory of 2700 2748 igfxwp32.exe 32 PID 2748 wrote to memory of 2700 2748 igfxwp32.exe 32 PID 2748 wrote to memory of 2700 2748 igfxwp32.exe 32 PID 2748 wrote to memory of 2700 2748 igfxwp32.exe 32 PID 2700 wrote to memory of 2652 2700 igfxwp32.exe 33 PID 2700 wrote to memory of 2652 2700 igfxwp32.exe 33 PID 2700 wrote to memory of 2652 2700 igfxwp32.exe 33 PID 2700 wrote to memory of 2652 2700 igfxwp32.exe 33 PID 2700 wrote to memory of 2652 2700 igfxwp32.exe 33 PID 2700 wrote to memory of 2652 2700 igfxwp32.exe 33 PID 2700 wrote to memory of 2652 2700 igfxwp32.exe 33 PID 2652 wrote to memory of 2000 2652 igfxwp32.exe 34 PID 2652 wrote to memory of 2000 2652 igfxwp32.exe 34 PID 2652 wrote to memory of 2000 2652 igfxwp32.exe 34 PID 2652 wrote to memory of 2000 2652 igfxwp32.exe 34 PID 2000 wrote to memory of 2104 2000 igfxwp32.exe 35 PID 2000 wrote to memory of 2104 2000 igfxwp32.exe 35 PID 2000 wrote to memory of 2104 2000 igfxwp32.exe 35 PID 2000 wrote to memory of 2104 2000 igfxwp32.exe 35 PID 2000 wrote to memory of 2104 2000 igfxwp32.exe 35 PID 2000 wrote to memory of 2104 2000 igfxwp32.exe 35 PID 2000 wrote to memory of 2104 2000 igfxwp32.exe 35 PID 2104 wrote to memory of 3044 2104 igfxwp32.exe 36 PID 2104 wrote to memory of 3044 2104 igfxwp32.exe 36 PID 2104 wrote to memory of 3044 2104 igfxwp32.exe 36 PID 2104 wrote to memory of 3044 2104 igfxwp32.exe 36 PID 3044 wrote to memory of 3032 3044 igfxwp32.exe 37 PID 3044 wrote to memory of 3032 3044 igfxwp32.exe 37 PID 3044 wrote to memory of 3032 3044 igfxwp32.exe 37 PID 3044 wrote to memory of 3032 3044 igfxwp32.exe 37 PID 3044 wrote to memory of 3032 3044 igfxwp32.exe 37 PID 3044 wrote to memory of 3032 3044 igfxwp32.exe 37 PID 3044 wrote to memory of 3032 3044 igfxwp32.exe 37 PID 3032 wrote to memory of 396 3032 igfxwp32.exe 38 PID 3032 wrote to memory of 396 3032 igfxwp32.exe 38 PID 3032 wrote to memory of 396 3032 igfxwp32.exe 38 PID 3032 wrote to memory of 396 3032 igfxwp32.exe 38 PID 396 wrote to memory of 1704 396 igfxwp32.exe 39 PID 396 wrote to memory of 1704 396 igfxwp32.exe 39 PID 396 wrote to memory of 1704 396 igfxwp32.exe 39 PID 396 wrote to memory of 1704 396 igfxwp32.exe 39 PID 396 wrote to memory of 1704 396 igfxwp32.exe 39 PID 396 wrote to memory of 1704 396 igfxwp32.exe 39 PID 396 wrote to memory of 1704 396 igfxwp32.exe 39 PID 1704 wrote to memory of 2980 1704 igfxwp32.exe 40 PID 1704 wrote to memory of 2980 1704 igfxwp32.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd37420c2343dfdf731f1c1fcbecf7d8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bd37420c2343dfdf731f1c1fcbecf7d8_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\bd37420c2343dfdf731f1c1fcbecf7d8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bd37420c2343dfdf731f1c1fcbecf7d8_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Users\Admin\AppData\Local\Temp\BD3742~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Users\Admin\AppData\Local\Temp\BD3742~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2980 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2216 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:596 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1880 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1480 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2032 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:600 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:576 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1568 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1580 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2312 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2408 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2676 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2788 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2632 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2024 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1792 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2144 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1648 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2308 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe33⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1088 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2924 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1684 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1136 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2468 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2544 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2184 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1528 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1436 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:904 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2324 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2268 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:864 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:348 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2680 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2844 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe50⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2624 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2600 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe52⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2664 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe54⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2460 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2456 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe56⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1632 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2796 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe58⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2764 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:964 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe60⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:396 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:988 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe62⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:1732 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1776 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe64⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:680 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2292 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe66⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1260 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe67⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:960 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe68⤵
- Maps connected drives based on registry
- Drops file in System32 directory
PID:628 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe69⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:600 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe70⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2092 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe71⤵
- Suspicious use of SetThreadContext
PID:2120 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe72⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2336 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe73⤵
- Suspicious use of SetThreadContext
PID:2328 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe74⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2412 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe75⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2780 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe76⤵
- Maps connected drives based on registry
PID:2644
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5bd37420c2343dfdf731f1c1fcbecf7d8
SHA180131b92654433b97334e7696d94e982faae38ab
SHA2561051c309491d28d37f2cd428b3ce112ae632f7a343da0a0b0a69bc24c47d9f55
SHA5125879ade106a7ccfd5c1ca85b13e95b95603a915ed3cedf9576b14eba0f377813941fe5d148e75ef8d5f9b4cac61ae1ee60fc5b99f54db516d613fe6c2918b46e