Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 04:10
Behavioral task
behavioral1
Sample
c0bdcab5b330f0061cfc9cf78d290022_JaffaCakes118.exe
Resource
win7-20241023-en
General
-
Target
c0bdcab5b330f0061cfc9cf78d290022_JaffaCakes118.exe
-
Size
204KB
-
MD5
c0bdcab5b330f0061cfc9cf78d290022
-
SHA1
5ff889e8a2d5aca669af50af205c34583e6382d8
-
SHA256
e4315f5a51bc76042f9fa09a27a6e8dfb79ee0a480bf03db7c3c284ed3653fbe
-
SHA512
0ff1dc742052adb2b8603bfe0e21db66180ba77c0b822817df34e48e5644de2ef3d269cb4bee5ab41264c6a0bdace0a9d2092c6801cd89529beea18af0a499f2
-
SSDEEP
6144:gdZRVIkxJER7arwtdX00YZ88aH6WwQ1kO5/8P:gtJi7BdX00YZ88aHuQ1kOCP
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2616 igfxpx32.exe -
Executes dropped EXE 64 IoCs
pid Process 2616 igfxpx32.exe 2848 igfxpx32.exe 2984 igfxpx32.exe 2688 igfxpx32.exe 2488 igfxpx32.exe 1524 igfxpx32.exe 2040 igfxpx32.exe 2024 igfxpx32.exe 1764 igfxpx32.exe 2344 igfxpx32.exe 316 igfxpx32.exe 1964 igfxpx32.exe 624 igfxpx32.exe 2508 igfxpx32.exe 2776 igfxpx32.exe 2468 igfxpx32.exe 1852 igfxpx32.exe 2204 igfxpx32.exe 2572 igfxpx32.exe 1088 igfxpx32.exe 2944 igfxpx32.exe 2884 igfxpx32.exe 2804 igfxpx32.exe 2760 igfxpx32.exe 2352 igfxpx32.exe 1924 igfxpx32.exe 2008 igfxpx32.exe 2148 igfxpx32.exe 1056 igfxpx32.exe 1304 igfxpx32.exe 852 igfxpx32.exe 2272 igfxpx32.exe 2992 igfxpx32.exe 2108 igfxpx32.exe 468 igfxpx32.exe 1900 igfxpx32.exe 700 igfxpx32.exe 2540 igfxpx32.exe 1916 igfxpx32.exe 1760 igfxpx32.exe 2648 igfxpx32.exe 2420 igfxpx32.exe 2000 igfxpx32.exe 3056 igfxpx32.exe 3020 igfxpx32.exe 2228 igfxpx32.exe 1808 igfxpx32.exe 2692 igfxpx32.exe 2232 igfxpx32.exe 2488 igfxpx32.exe 2116 igfxpx32.exe 2436 igfxpx32.exe 1944 igfxpx32.exe 1800 igfxpx32.exe 3004 igfxpx32.exe 2676 igfxpx32.exe 1280 igfxpx32.exe 2236 igfxpx32.exe 2272 igfxpx32.exe 448 igfxpx32.exe 1756 igfxpx32.exe 1652 igfxpx32.exe 1508 igfxpx32.exe 912 igfxpx32.exe -
Loads dropped DLL 64 IoCs
pid Process 2140 c0bdcab5b330f0061cfc9cf78d290022_JaffaCakes118.exe 2140 c0bdcab5b330f0061cfc9cf78d290022_JaffaCakes118.exe 2616 igfxpx32.exe 2616 igfxpx32.exe 2848 igfxpx32.exe 2848 igfxpx32.exe 2984 igfxpx32.exe 2984 igfxpx32.exe 2688 igfxpx32.exe 2688 igfxpx32.exe 2488 igfxpx32.exe 2488 igfxpx32.exe 1524 igfxpx32.exe 1524 igfxpx32.exe 2040 igfxpx32.exe 2040 igfxpx32.exe 2024 igfxpx32.exe 2024 igfxpx32.exe 1764 igfxpx32.exe 1764 igfxpx32.exe 2344 igfxpx32.exe 2344 igfxpx32.exe 316 igfxpx32.exe 316 igfxpx32.exe 1964 igfxpx32.exe 1964 igfxpx32.exe 624 igfxpx32.exe 624 igfxpx32.exe 2508 igfxpx32.exe 2508 igfxpx32.exe 2776 igfxpx32.exe 2776 igfxpx32.exe 2468 igfxpx32.exe 2468 igfxpx32.exe 1852 igfxpx32.exe 1852 igfxpx32.exe 2204 igfxpx32.exe 2204 igfxpx32.exe 2572 igfxpx32.exe 2572 igfxpx32.exe 1088 igfxpx32.exe 1088 igfxpx32.exe 2944 igfxpx32.exe 2944 igfxpx32.exe 2884 igfxpx32.exe 2884 igfxpx32.exe 2804 igfxpx32.exe 2804 igfxpx32.exe 2760 igfxpx32.exe 2760 igfxpx32.exe 2352 igfxpx32.exe 2352 igfxpx32.exe 1924 igfxpx32.exe 1924 igfxpx32.exe 2008 igfxpx32.exe 2008 igfxpx32.exe 2148 igfxpx32.exe 2148 igfxpx32.exe 1056 igfxpx32.exe 1056 igfxpx32.exe 1304 igfxpx32.exe 1304 igfxpx32.exe 852 igfxpx32.exe 852 igfxpx32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 c0bdcab5b330f0061cfc9cf78d290022_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ c0bdcab5b330f0061cfc9cf78d290022_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe c0bdcab5b330f0061cfc9cf78d290022_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe -
resource yara_rule behavioral1/memory/2140-0-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral1/files/0x0007000000012118-11.dat upx behavioral1/memory/2984-32-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral1/memory/2688-38-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral1/memory/2688-44-0x00000000033B0000-0x0000000003452000-memory.dmp upx behavioral1/memory/2040-61-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral1/memory/2024-71-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral1/memory/1764-76-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral1/memory/316-92-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral1/memory/1964-101-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral1/memory/2468-127-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral1/memory/2572-142-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral1/memory/1088-148-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral1/memory/2884-152-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral1/memory/2148-172-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral1/memory/2992-184-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral1/memory/1900-192-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral1/memory/700-195-0x0000000000400000-0x00000000004A2000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0bdcab5b330f0061cfc9cf78d290022_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2140 c0bdcab5b330f0061cfc9cf78d290022_JaffaCakes118.exe 2140 c0bdcab5b330f0061cfc9cf78d290022_JaffaCakes118.exe 2616 igfxpx32.exe 2616 igfxpx32.exe 2848 igfxpx32.exe 2848 igfxpx32.exe 2984 igfxpx32.exe 2984 igfxpx32.exe 2688 igfxpx32.exe 2688 igfxpx32.exe 2488 igfxpx32.exe 2488 igfxpx32.exe 1524 igfxpx32.exe 1524 igfxpx32.exe 2040 igfxpx32.exe 2040 igfxpx32.exe 2024 igfxpx32.exe 2024 igfxpx32.exe 1764 igfxpx32.exe 1764 igfxpx32.exe 2344 igfxpx32.exe 2344 igfxpx32.exe 316 igfxpx32.exe 316 igfxpx32.exe 1964 igfxpx32.exe 1964 igfxpx32.exe 624 igfxpx32.exe 624 igfxpx32.exe 2508 igfxpx32.exe 2508 igfxpx32.exe 2776 igfxpx32.exe 2776 igfxpx32.exe 2468 igfxpx32.exe 2468 igfxpx32.exe 1852 igfxpx32.exe 1852 igfxpx32.exe 2204 igfxpx32.exe 2204 igfxpx32.exe 2572 igfxpx32.exe 2572 igfxpx32.exe 1088 igfxpx32.exe 1088 igfxpx32.exe 2944 igfxpx32.exe 2944 igfxpx32.exe 2884 igfxpx32.exe 2884 igfxpx32.exe 2804 igfxpx32.exe 2804 igfxpx32.exe 2760 igfxpx32.exe 2760 igfxpx32.exe 2352 igfxpx32.exe 2352 igfxpx32.exe 1924 igfxpx32.exe 1924 igfxpx32.exe 2008 igfxpx32.exe 2008 igfxpx32.exe 2148 igfxpx32.exe 2148 igfxpx32.exe 1056 igfxpx32.exe 1056 igfxpx32.exe 1304 igfxpx32.exe 1304 igfxpx32.exe 852 igfxpx32.exe 852 igfxpx32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2616 2140 c0bdcab5b330f0061cfc9cf78d290022_JaffaCakes118.exe 31 PID 2140 wrote to memory of 2616 2140 c0bdcab5b330f0061cfc9cf78d290022_JaffaCakes118.exe 31 PID 2140 wrote to memory of 2616 2140 c0bdcab5b330f0061cfc9cf78d290022_JaffaCakes118.exe 31 PID 2140 wrote to memory of 2616 2140 c0bdcab5b330f0061cfc9cf78d290022_JaffaCakes118.exe 31 PID 2616 wrote to memory of 2848 2616 igfxpx32.exe 32 PID 2616 wrote to memory of 2848 2616 igfxpx32.exe 32 PID 2616 wrote to memory of 2848 2616 igfxpx32.exe 32 PID 2616 wrote to memory of 2848 2616 igfxpx32.exe 32 PID 2848 wrote to memory of 2984 2848 igfxpx32.exe 33 PID 2848 wrote to memory of 2984 2848 igfxpx32.exe 33 PID 2848 wrote to memory of 2984 2848 igfxpx32.exe 33 PID 2848 wrote to memory of 2984 2848 igfxpx32.exe 33 PID 2984 wrote to memory of 2688 2984 igfxpx32.exe 34 PID 2984 wrote to memory of 2688 2984 igfxpx32.exe 34 PID 2984 wrote to memory of 2688 2984 igfxpx32.exe 34 PID 2984 wrote to memory of 2688 2984 igfxpx32.exe 34 PID 2688 wrote to memory of 2488 2688 igfxpx32.exe 35 PID 2688 wrote to memory of 2488 2688 igfxpx32.exe 35 PID 2688 wrote to memory of 2488 2688 igfxpx32.exe 35 PID 2688 wrote to memory of 2488 2688 igfxpx32.exe 35 PID 2488 wrote to memory of 1524 2488 igfxpx32.exe 36 PID 2488 wrote to memory of 1524 2488 igfxpx32.exe 36 PID 2488 wrote to memory of 1524 2488 igfxpx32.exe 36 PID 2488 wrote to memory of 1524 2488 igfxpx32.exe 36 PID 1524 wrote to memory of 2040 1524 igfxpx32.exe 37 PID 1524 wrote to memory of 2040 1524 igfxpx32.exe 37 PID 1524 wrote to memory of 2040 1524 igfxpx32.exe 37 PID 1524 wrote to memory of 2040 1524 igfxpx32.exe 37 PID 2040 wrote to memory of 2024 2040 igfxpx32.exe 38 PID 2040 wrote to memory of 2024 2040 igfxpx32.exe 38 PID 2040 wrote to memory of 2024 2040 igfxpx32.exe 38 PID 2040 wrote to memory of 2024 2040 igfxpx32.exe 38 PID 2024 wrote to memory of 1764 2024 igfxpx32.exe 39 PID 2024 wrote to memory of 1764 2024 igfxpx32.exe 39 PID 2024 wrote to memory of 1764 2024 igfxpx32.exe 39 PID 2024 wrote to memory of 1764 2024 igfxpx32.exe 39 PID 1764 wrote to memory of 2344 1764 igfxpx32.exe 40 PID 1764 wrote to memory of 2344 1764 igfxpx32.exe 40 PID 1764 wrote to memory of 2344 1764 igfxpx32.exe 40 PID 1764 wrote to memory of 2344 1764 igfxpx32.exe 40 PID 2344 wrote to memory of 316 2344 igfxpx32.exe 41 PID 2344 wrote to memory of 316 2344 igfxpx32.exe 41 PID 2344 wrote to memory of 316 2344 igfxpx32.exe 41 PID 2344 wrote to memory of 316 2344 igfxpx32.exe 41 PID 316 wrote to memory of 1964 316 igfxpx32.exe 42 PID 316 wrote to memory of 1964 316 igfxpx32.exe 42 PID 316 wrote to memory of 1964 316 igfxpx32.exe 42 PID 316 wrote to memory of 1964 316 igfxpx32.exe 42 PID 1964 wrote to memory of 624 1964 igfxpx32.exe 43 PID 1964 wrote to memory of 624 1964 igfxpx32.exe 43 PID 1964 wrote to memory of 624 1964 igfxpx32.exe 43 PID 1964 wrote to memory of 624 1964 igfxpx32.exe 43 PID 624 wrote to memory of 2508 624 igfxpx32.exe 44 PID 624 wrote to memory of 2508 624 igfxpx32.exe 44 PID 624 wrote to memory of 2508 624 igfxpx32.exe 44 PID 624 wrote to memory of 2508 624 igfxpx32.exe 44 PID 2508 wrote to memory of 2776 2508 igfxpx32.exe 45 PID 2508 wrote to memory of 2776 2508 igfxpx32.exe 45 PID 2508 wrote to memory of 2776 2508 igfxpx32.exe 45 PID 2508 wrote to memory of 2776 2508 igfxpx32.exe 45 PID 2776 wrote to memory of 2468 2776 igfxpx32.exe 46 PID 2776 wrote to memory of 2468 2776 igfxpx32.exe 46 PID 2776 wrote to memory of 2468 2776 igfxpx32.exe 46 PID 2776 wrote to memory of 2468 2776 igfxpx32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0bdcab5b330f0061cfc9cf78d290022_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c0bdcab5b330f0061cfc9cf78d290022_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Users\Admin\AppData\Local\Temp\C0BDCA~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2468 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1852 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2204 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2572 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1088 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2944 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2884 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2804 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2760 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2352 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1924 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2008 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2148 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1056 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1304 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:852 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2272 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2992 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2108 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:468 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1900 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:700 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2540 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1916 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1760 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2648 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2420 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2000 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3056 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:3020 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2228 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1808 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe49⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2692 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe50⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2232 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe51⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2488 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2116 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2436 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe54⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1944 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe55⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1800 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3004 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe57⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2676 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe58⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1280 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe59⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2236 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2272 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe61⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:448 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe62⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1756 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe63⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1652 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe64⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1508 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe65⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:912 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe66⤵
- System Location Discovery: System Language Discovery
PID:2196
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5c0bdcab5b330f0061cfc9cf78d290022
SHA15ff889e8a2d5aca669af50af205c34583e6382d8
SHA256e4315f5a51bc76042f9fa09a27a6e8dfb79ee0a480bf03db7c3c284ed3653fbe
SHA5120ff1dc742052adb2b8603bfe0e21db66180ba77c0b822817df34e48e5644de2ef3d269cb4bee5ab41264c6a0bdace0a9d2092c6801cd89529beea18af0a499f2