Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 03:16
Static task
static1
Behavioral task
behavioral1
Sample
c08f8d4e6b83474a05e2de1e2ca11769_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c08f8d4e6b83474a05e2de1e2ca11769_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
c08f8d4e6b83474a05e2de1e2ca11769_JaffaCakes118.exe
-
Size
222KB
-
MD5
c08f8d4e6b83474a05e2de1e2ca11769
-
SHA1
5e04db1bfee9af6d4dbf510cb0eb9ce302b93e32
-
SHA256
e7f1e5627aeaed7d0badf27e0c5c40f4d505e7620a4251ab40f9c6d9b3f58a5a
-
SHA512
aef5b9a1ec5441e741f5ef7b04cf6975845f028a5de69c0265c9eef2c1b836d1eb22b8094779a414e4e4a72bdf5a6369fb240cc066fe71122d2e78ba676936da
-
SSDEEP
3072:IA8oq1KxZ2pfOutpE1x0liTRhohMRWWnQZDAhAkvr/skjGdOpdaPLAYvru5D6Y7L:f4WZKvk6Woh0jAWTsesS5uT+MOq
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2996 igfxdpr32.exe -
Executes dropped EXE 48 IoCs
pid Process 2996 igfxdpr32.exe 2720 igfxdpr32.exe 2760 igfxdpr32.exe 2588 igfxdpr32.exe 2536 igfxdpr32.exe 1824 igfxdpr32.exe 844 igfxdpr32.exe 2504 igfxdpr32.exe 2172 igfxdpr32.exe 712 igfxdpr32.exe 916 igfxdpr32.exe 1336 igfxdpr32.exe 1404 igfxdpr32.exe 736 igfxdpr32.exe 732 igfxdpr32.exe 352 igfxdpr32.exe 1504 igfxdpr32.exe 2956 igfxdpr32.exe 2544 igfxdpr32.exe 2732 igfxdpr32.exe 2736 igfxdpr32.exe 2320 igfxdpr32.exe 2628 igfxdpr32.exe 1716 igfxdpr32.exe 1216 igfxdpr32.exe 2416 igfxdpr32.exe 1248 igfxdpr32.exe 264 igfxdpr32.exe 632 igfxdpr32.exe 1732 igfxdpr32.exe 988 igfxdpr32.exe 1664 igfxdpr32.exe 908 igfxdpr32.exe 2424 igfxdpr32.exe 680 igfxdpr32.exe 2520 igfxdpr32.exe 2284 igfxdpr32.exe 2132 igfxdpr32.exe 3008 igfxdpr32.exe 2880 igfxdpr32.exe 2856 igfxdpr32.exe 2832 igfxdpr32.exe 2624 igfxdpr32.exe 2704 igfxdpr32.exe 2964 igfxdpr32.exe 2980 igfxdpr32.exe 1648 igfxdpr32.exe 372 igfxdpr32.exe -
Loads dropped DLL 64 IoCs
pid Process 2084 c08f8d4e6b83474a05e2de1e2ca11769_JaffaCakes118.exe 2084 c08f8d4e6b83474a05e2de1e2ca11769_JaffaCakes118.exe 2996 igfxdpr32.exe 2996 igfxdpr32.exe 2720 igfxdpr32.exe 2720 igfxdpr32.exe 2760 igfxdpr32.exe 2760 igfxdpr32.exe 2588 igfxdpr32.exe 2588 igfxdpr32.exe 2536 igfxdpr32.exe 2536 igfxdpr32.exe 1824 igfxdpr32.exe 1824 igfxdpr32.exe 844 igfxdpr32.exe 844 igfxdpr32.exe 2504 igfxdpr32.exe 2504 igfxdpr32.exe 2172 igfxdpr32.exe 2172 igfxdpr32.exe 712 igfxdpr32.exe 712 igfxdpr32.exe 916 igfxdpr32.exe 916 igfxdpr32.exe 1336 igfxdpr32.exe 1336 igfxdpr32.exe 1404 igfxdpr32.exe 1404 igfxdpr32.exe 736 igfxdpr32.exe 736 igfxdpr32.exe 732 igfxdpr32.exe 732 igfxdpr32.exe 352 igfxdpr32.exe 352 igfxdpr32.exe 1504 igfxdpr32.exe 1504 igfxdpr32.exe 2956 igfxdpr32.exe 2956 igfxdpr32.exe 2544 igfxdpr32.exe 2544 igfxdpr32.exe 2732 igfxdpr32.exe 2732 igfxdpr32.exe 2736 igfxdpr32.exe 2736 igfxdpr32.exe 2320 igfxdpr32.exe 2320 igfxdpr32.exe 2628 igfxdpr32.exe 2628 igfxdpr32.exe 1716 igfxdpr32.exe 1716 igfxdpr32.exe 1216 igfxdpr32.exe 1216 igfxdpr32.exe 2416 igfxdpr32.exe 2416 igfxdpr32.exe 1248 igfxdpr32.exe 1248 igfxdpr32.exe 264 igfxdpr32.exe 264 igfxdpr32.exe 632 igfxdpr32.exe 632 igfxdpr32.exe 1732 igfxdpr32.exe 1732 igfxdpr32.exe 988 igfxdpr32.exe 988 igfxdpr32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum c08f8d4e6b83474a05e2de1e2ca11769_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpr32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpr32.exe File created C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpr32.exe File created C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File created C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File created C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File created C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File created C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File created C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File created C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File created C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpr32.exe File created C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File created C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpr32.exe File created C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File created C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File created C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpr32.exe File created C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpr32.exe File created C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File created C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File created C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\igfxdpr32.exe igfxdpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 48 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c08f8d4e6b83474a05e2de1e2ca11769_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpr32.exe -
Suspicious behavior: EnumeratesProcesses 49 IoCs
pid Process 2084 c08f8d4e6b83474a05e2de1e2ca11769_JaffaCakes118.exe 2996 igfxdpr32.exe 2720 igfxdpr32.exe 2760 igfxdpr32.exe 2588 igfxdpr32.exe 2536 igfxdpr32.exe 1824 igfxdpr32.exe 844 igfxdpr32.exe 2504 igfxdpr32.exe 2172 igfxdpr32.exe 712 igfxdpr32.exe 916 igfxdpr32.exe 1336 igfxdpr32.exe 1404 igfxdpr32.exe 736 igfxdpr32.exe 732 igfxdpr32.exe 352 igfxdpr32.exe 1504 igfxdpr32.exe 2956 igfxdpr32.exe 2544 igfxdpr32.exe 2732 igfxdpr32.exe 2736 igfxdpr32.exe 2320 igfxdpr32.exe 2628 igfxdpr32.exe 1716 igfxdpr32.exe 1216 igfxdpr32.exe 2416 igfxdpr32.exe 1248 igfxdpr32.exe 264 igfxdpr32.exe 632 igfxdpr32.exe 1732 igfxdpr32.exe 988 igfxdpr32.exe 1664 igfxdpr32.exe 908 igfxdpr32.exe 2424 igfxdpr32.exe 680 igfxdpr32.exe 2520 igfxdpr32.exe 2284 igfxdpr32.exe 2132 igfxdpr32.exe 3008 igfxdpr32.exe 2880 igfxdpr32.exe 2856 igfxdpr32.exe 2832 igfxdpr32.exe 2624 igfxdpr32.exe 2704 igfxdpr32.exe 2964 igfxdpr32.exe 2980 igfxdpr32.exe 1648 igfxdpr32.exe 372 igfxdpr32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2996 2084 c08f8d4e6b83474a05e2de1e2ca11769_JaffaCakes118.exe 30 PID 2084 wrote to memory of 2996 2084 c08f8d4e6b83474a05e2de1e2ca11769_JaffaCakes118.exe 30 PID 2084 wrote to memory of 2996 2084 c08f8d4e6b83474a05e2de1e2ca11769_JaffaCakes118.exe 30 PID 2084 wrote to memory of 2996 2084 c08f8d4e6b83474a05e2de1e2ca11769_JaffaCakes118.exe 30 PID 2996 wrote to memory of 2720 2996 igfxdpr32.exe 31 PID 2996 wrote to memory of 2720 2996 igfxdpr32.exe 31 PID 2996 wrote to memory of 2720 2996 igfxdpr32.exe 31 PID 2996 wrote to memory of 2720 2996 igfxdpr32.exe 31 PID 2720 wrote to memory of 2760 2720 igfxdpr32.exe 32 PID 2720 wrote to memory of 2760 2720 igfxdpr32.exe 32 PID 2720 wrote to memory of 2760 2720 igfxdpr32.exe 32 PID 2720 wrote to memory of 2760 2720 igfxdpr32.exe 32 PID 2760 wrote to memory of 2588 2760 igfxdpr32.exe 33 PID 2760 wrote to memory of 2588 2760 igfxdpr32.exe 33 PID 2760 wrote to memory of 2588 2760 igfxdpr32.exe 33 PID 2760 wrote to memory of 2588 2760 igfxdpr32.exe 33 PID 2588 wrote to memory of 2536 2588 igfxdpr32.exe 34 PID 2588 wrote to memory of 2536 2588 igfxdpr32.exe 34 PID 2588 wrote to memory of 2536 2588 igfxdpr32.exe 34 PID 2588 wrote to memory of 2536 2588 igfxdpr32.exe 34 PID 2536 wrote to memory of 1824 2536 igfxdpr32.exe 36 PID 2536 wrote to memory of 1824 2536 igfxdpr32.exe 36 PID 2536 wrote to memory of 1824 2536 igfxdpr32.exe 36 PID 2536 wrote to memory of 1824 2536 igfxdpr32.exe 36 PID 1824 wrote to memory of 844 1824 igfxdpr32.exe 37 PID 1824 wrote to memory of 844 1824 igfxdpr32.exe 37 PID 1824 wrote to memory of 844 1824 igfxdpr32.exe 37 PID 1824 wrote to memory of 844 1824 igfxdpr32.exe 37 PID 844 wrote to memory of 2504 844 igfxdpr32.exe 38 PID 844 wrote to memory of 2504 844 igfxdpr32.exe 38 PID 844 wrote to memory of 2504 844 igfxdpr32.exe 38 PID 844 wrote to memory of 2504 844 igfxdpr32.exe 38 PID 2504 wrote to memory of 2172 2504 igfxdpr32.exe 39 PID 2504 wrote to memory of 2172 2504 igfxdpr32.exe 39 PID 2504 wrote to memory of 2172 2504 igfxdpr32.exe 39 PID 2504 wrote to memory of 2172 2504 igfxdpr32.exe 39 PID 2172 wrote to memory of 712 2172 igfxdpr32.exe 40 PID 2172 wrote to memory of 712 2172 igfxdpr32.exe 40 PID 2172 wrote to memory of 712 2172 igfxdpr32.exe 40 PID 2172 wrote to memory of 712 2172 igfxdpr32.exe 40 PID 712 wrote to memory of 916 712 igfxdpr32.exe 41 PID 712 wrote to memory of 916 712 igfxdpr32.exe 41 PID 712 wrote to memory of 916 712 igfxdpr32.exe 41 PID 712 wrote to memory of 916 712 igfxdpr32.exe 41 PID 916 wrote to memory of 1336 916 igfxdpr32.exe 42 PID 916 wrote to memory of 1336 916 igfxdpr32.exe 42 PID 916 wrote to memory of 1336 916 igfxdpr32.exe 42 PID 916 wrote to memory of 1336 916 igfxdpr32.exe 42 PID 1336 wrote to memory of 1404 1336 igfxdpr32.exe 43 PID 1336 wrote to memory of 1404 1336 igfxdpr32.exe 43 PID 1336 wrote to memory of 1404 1336 igfxdpr32.exe 43 PID 1336 wrote to memory of 1404 1336 igfxdpr32.exe 43 PID 1404 wrote to memory of 736 1404 igfxdpr32.exe 44 PID 1404 wrote to memory of 736 1404 igfxdpr32.exe 44 PID 1404 wrote to memory of 736 1404 igfxdpr32.exe 44 PID 1404 wrote to memory of 736 1404 igfxdpr32.exe 44 PID 736 wrote to memory of 732 736 igfxdpr32.exe 45 PID 736 wrote to memory of 732 736 igfxdpr32.exe 45 PID 736 wrote to memory of 732 736 igfxdpr32.exe 45 PID 736 wrote to memory of 732 736 igfxdpr32.exe 45 PID 732 wrote to memory of 352 732 igfxdpr32.exe 46 PID 732 wrote to memory of 352 732 igfxdpr32.exe 46 PID 732 wrote to memory of 352 732 igfxdpr32.exe 46 PID 732 wrote to memory of 352 732 igfxdpr32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\c08f8d4e6b83474a05e2de1e2ca11769_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c08f8d4e6b83474a05e2de1e2ca11769_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Users\Admin\AppData\Local\Temp\C08F8D~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:352 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1504 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2956 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2544 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2732 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2736 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2320 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2628 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1716 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1216 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2416 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1248 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:264 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:632 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1732 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:988 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1664 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:908 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE35⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2424 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:680 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE37⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2520 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2284 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2132 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3008 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2880 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2856 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2832 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2624 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2704 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2964 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2980 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1648 -
C:\Windows\SysWOW64\igfxdpr32.exe"C:\Windows\system32\igfxdpr32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE49⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:372
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
222KB
MD5c08f8d4e6b83474a05e2de1e2ca11769
SHA15e04db1bfee9af6d4dbf510cb0eb9ce302b93e32
SHA256e7f1e5627aeaed7d0badf27e0c5c40f4d505e7620a4251ab40f9c6d9b3f58a5a
SHA512aef5b9a1ec5441e741f5ef7b04cf6975845f028a5de69c0265c9eef2c1b836d1eb22b8094779a414e4e4a72bdf5a6369fb240cc066fe71122d2e78ba676936da