Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 10:40
Static task
static1
Behavioral task
behavioral1
Sample
c74dd01a21871c8a57a96b51bf164f0c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c74dd01a21871c8a57a96b51bf164f0c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
c74dd01a21871c8a57a96b51bf164f0c_JaffaCakes118.exe
-
Size
268KB
-
MD5
c74dd01a21871c8a57a96b51bf164f0c
-
SHA1
93689e714be0e4930799e661acd40fcd1ccb55b1
-
SHA256
0a011d41ad1664fddeb76d929e0ab5e746a08af71cedddc5c2efcda49e6d5bba
-
SHA512
55c09c40a84f9bdd7e72906dc999465f3802dc9e26e8828107bc847267691347df269b5679ce7123c7210ec0b6b2a4890dab00df42c88b9337302c1e8fee0744
-
SSDEEP
3072:U6STyZ3kFoa3/fQRACWZSbxPjWQEvql7tw2HDox2nKe4yKmEVUgQm+eGxfARfizE:P6Foa3/fQgSV5ECl7GCoyKeLKm1g0mQY
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2900 igfxdfp32.exe -
Executes dropped EXE 64 IoCs
pid Process 2268 igfxdfp32.exe 2900 igfxdfp32.exe 2804 igfxdfp32.exe 2700 igfxdfp32.exe 2192 igfxdfp32.exe 1676 igfxdfp32.exe 2604 igfxdfp32.exe 988 igfxdfp32.exe 2712 igfxdfp32.exe 1376 igfxdfp32.exe 2980 igfxdfp32.exe 2100 igfxdfp32.exe 2516 igfxdfp32.exe 2920 igfxdfp32.exe 2224 igfxdfp32.exe 1008 igfxdfp32.exe 1808 igfxdfp32.exe 1080 igfxdfp32.exe 2172 igfxdfp32.exe 2884 igfxdfp32.exe 320 igfxdfp32.exe 1772 igfxdfp32.exe 2072 igfxdfp32.exe 2684 igfxdfp32.exe 2828 igfxdfp32.exe 2804 igfxdfp32.exe 2116 igfxdfp32.exe 1960 igfxdfp32.exe 2868 igfxdfp32.exe 2720 igfxdfp32.exe 2636 igfxdfp32.exe 1936 igfxdfp32.exe 768 igfxdfp32.exe 1820 igfxdfp32.exe 1940 igfxdfp32.exe 448 igfxdfp32.exe 2916 igfxdfp32.exe 1608 igfxdfp32.exe 1644 igfxdfp32.exe 688 igfxdfp32.exe 2196 igfxdfp32.exe 2332 igfxdfp32.exe 1744 igfxdfp32.exe 900 igfxdfp32.exe 1500 igfxdfp32.exe 2616 igfxdfp32.exe 2680 igfxdfp32.exe 2640 igfxdfp32.exe 2808 igfxdfp32.exe 2800 igfxdfp32.exe 1728 igfxdfp32.exe 576 igfxdfp32.exe 1640 igfxdfp32.exe 1980 igfxdfp32.exe 2524 igfxdfp32.exe 1928 igfxdfp32.exe 496 igfxdfp32.exe 3012 igfxdfp32.exe 2080 igfxdfp32.exe 2516 igfxdfp32.exe 1244 igfxdfp32.exe 696 igfxdfp32.exe 1384 igfxdfp32.exe 1808 igfxdfp32.exe -
Loads dropped DLL 64 IoCs
pid Process 2484 c74dd01a21871c8a57a96b51bf164f0c_JaffaCakes118.exe 2484 c74dd01a21871c8a57a96b51bf164f0c_JaffaCakes118.exe 2900 igfxdfp32.exe 2900 igfxdfp32.exe 2700 igfxdfp32.exe 2700 igfxdfp32.exe 1676 igfxdfp32.exe 1676 igfxdfp32.exe 988 igfxdfp32.exe 988 igfxdfp32.exe 1376 igfxdfp32.exe 1376 igfxdfp32.exe 2100 igfxdfp32.exe 2100 igfxdfp32.exe 2920 igfxdfp32.exe 2920 igfxdfp32.exe 1008 igfxdfp32.exe 1008 igfxdfp32.exe 1080 igfxdfp32.exe 1080 igfxdfp32.exe 2884 igfxdfp32.exe 2884 igfxdfp32.exe 1772 igfxdfp32.exe 1772 igfxdfp32.exe 2684 igfxdfp32.exe 2684 igfxdfp32.exe 2804 igfxdfp32.exe 2804 igfxdfp32.exe 1960 igfxdfp32.exe 1960 igfxdfp32.exe 2720 igfxdfp32.exe 2720 igfxdfp32.exe 1936 igfxdfp32.exe 1936 igfxdfp32.exe 1820 igfxdfp32.exe 1820 igfxdfp32.exe 448 igfxdfp32.exe 448 igfxdfp32.exe 1608 igfxdfp32.exe 1608 igfxdfp32.exe 688 igfxdfp32.exe 688 igfxdfp32.exe 2332 igfxdfp32.exe 2332 igfxdfp32.exe 900 igfxdfp32.exe 900 igfxdfp32.exe 2616 igfxdfp32.exe 2616 igfxdfp32.exe 2640 igfxdfp32.exe 2640 igfxdfp32.exe 2800 igfxdfp32.exe 2800 igfxdfp32.exe 576 igfxdfp32.exe 576 igfxdfp32.exe 1980 igfxdfp32.exe 1980 igfxdfp32.exe 1928 igfxdfp32.exe 1928 igfxdfp32.exe 3012 igfxdfp32.exe 3012 igfxdfp32.exe 2516 igfxdfp32.exe 2516 igfxdfp32.exe 696 igfxdfp32.exe 696 igfxdfp32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 c74dd01a21871c8a57a96b51bf164f0c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdfp32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdfp32.exe File created C:\Windows\SysWOW64\igfxdfp32.exe igfxdfp32.exe -
Suspicious use of SetThreadContext 56 IoCs
description pid Process procid_target PID 2512 set thread context of 2484 2512 c74dd01a21871c8a57a96b51bf164f0c_JaffaCakes118.exe 31 PID 2268 set thread context of 2900 2268 igfxdfp32.exe 33 PID 2804 set thread context of 2700 2804 igfxdfp32.exe 35 PID 2192 set thread context of 1676 2192 igfxdfp32.exe 37 PID 2604 set thread context of 988 2604 igfxdfp32.exe 39 PID 2712 set thread context of 1376 2712 igfxdfp32.exe 41 PID 2980 set thread context of 2100 2980 igfxdfp32.exe 43 PID 2516 set thread context of 2920 2516 igfxdfp32.exe 45 PID 2224 set thread context of 1008 2224 igfxdfp32.exe 47 PID 1808 set thread context of 1080 1808 igfxdfp32.exe 49 PID 2172 set thread context of 2884 2172 igfxdfp32.exe 51 PID 320 set thread context of 1772 320 igfxdfp32.exe 53 PID 2072 set thread context of 2684 2072 igfxdfp32.exe 55 PID 2828 set thread context of 2804 2828 igfxdfp32.exe 57 PID 2116 set thread context of 1960 2116 igfxdfp32.exe 59 PID 2868 set thread context of 2720 2868 igfxdfp32.exe 61 PID 2636 set thread context of 1936 2636 igfxdfp32.exe 63 PID 768 set thread context of 1820 768 igfxdfp32.exe 65 PID 1940 set thread context of 448 1940 igfxdfp32.exe 67 PID 2916 set thread context of 1608 2916 igfxdfp32.exe 69 PID 1644 set thread context of 688 1644 igfxdfp32.exe 71 PID 2196 set thread context of 2332 2196 igfxdfp32.exe 73 PID 1744 set thread context of 900 1744 igfxdfp32.exe 75 PID 1500 set thread context of 2616 1500 igfxdfp32.exe 77 PID 2680 set thread context of 2640 2680 igfxdfp32.exe 79 PID 2808 set thread context of 2800 2808 igfxdfp32.exe 81 PID 1728 set thread context of 576 1728 igfxdfp32.exe 83 PID 1640 set thread context of 1980 1640 igfxdfp32.exe 85 PID 2524 set thread context of 1928 2524 igfxdfp32.exe 87 PID 496 set thread context of 3012 496 igfxdfp32.exe 89 PID 2080 set thread context of 2516 2080 igfxdfp32.exe 92 PID 1244 set thread context of 696 1244 igfxdfp32.exe 94 PID 1384 set thread context of 1808 1384 igfxdfp32.exe 96 PID 2352 set thread context of 852 2352 igfxdfp32.exe 98 PID 904 set thread context of 820 904 igfxdfp32.exe 100 PID 1628 set thread context of 1572 1628 igfxdfp32.exe 102 PID 1092 set thread context of 2084 1092 igfxdfp32.exe 104 PID 2432 set thread context of 2692 2432 igfxdfp32.exe 106 PID 2564 set thread context of 1716 2564 igfxdfp32.exe 108 PID 1656 set thread context of 636 1656 igfxdfp32.exe 110 PID 1640 set thread context of 2032 1640 igfxdfp32.exe 112 PID 1620 set thread context of 2024 1620 igfxdfp32.exe 114 PID 1860 set thread context of 2948 1860 igfxdfp32.exe 116 PID 1792 set thread context of 2728 1792 igfxdfp32.exe 118 PID 1508 set thread context of 1552 1508 igfxdfp32.exe 120 PID 692 set thread context of 2244 692 igfxdfp32.exe 122 PID 2476 set thread context of 2348 2476 igfxdfp32.exe 124 PID 2508 set thread context of 2344 2508 igfxdfp32.exe 126 PID 2176 set thread context of 1036 2176 igfxdfp32.exe 128 PID 1972 set thread context of 2544 1972 igfxdfp32.exe 130 PID 2828 set thread context of 2600 2828 igfxdfp32.exe 132 PID 1700 set thread context of 1112 1700 igfxdfp32.exe 134 PID 2596 set thread context of 1252 2596 igfxdfp32.exe 136 PID 2776 set thread context of 2624 2776 igfxdfp32.exe 138 PID 1568 set thread context of 676 1568 igfxdfp32.exe 140 PID 1364 set thread context of 1244 1364 igfxdfp32.exe 142 -
resource yara_rule behavioral1/memory/2484-11-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2484-14-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2484-13-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2484-12-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2484-9-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2484-6-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2484-4-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2900-41-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2900-40-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2900-39-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2900-38-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2484-27-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2900-47-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2700-57-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2700-58-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2700-59-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2700-60-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2700-66-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/1676-76-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/1676-84-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/988-96-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/988-98-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/988-97-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/988-102-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/1376-124-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2100-133-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2100-141-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2920-152-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2920-163-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/1008-179-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/1080-192-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/1080-198-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2884-209-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2884-220-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/1772-228-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/1772-237-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2684-258-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2804-274-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/1960-285-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/1960-290-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2720-300-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2720-306-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/1936-315-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/1936-320-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/1820-330-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/1820-335-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/448-345-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/448-350-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/1608-360-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/1608-367-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/688-374-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/688-382-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2332-390-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2332-395-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/900-409-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2616-419-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2616-424-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2640-438-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2800-448-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/2800-453-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/576-463-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/576-468-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/1980-478-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/1980-483-0x0000000000400000-0x000000000045F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c74dd01a21871c8a57a96b51bf164f0c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdfp32.exe -
Suspicious behavior: EnumeratesProcesses 55 IoCs
pid Process 2484 c74dd01a21871c8a57a96b51bf164f0c_JaffaCakes118.exe 2900 igfxdfp32.exe 2700 igfxdfp32.exe 1676 igfxdfp32.exe 988 igfxdfp32.exe 1376 igfxdfp32.exe 2100 igfxdfp32.exe 2920 igfxdfp32.exe 1008 igfxdfp32.exe 1080 igfxdfp32.exe 2884 igfxdfp32.exe 1772 igfxdfp32.exe 2684 igfxdfp32.exe 2804 igfxdfp32.exe 1960 igfxdfp32.exe 2720 igfxdfp32.exe 1936 igfxdfp32.exe 1820 igfxdfp32.exe 448 igfxdfp32.exe 1608 igfxdfp32.exe 688 igfxdfp32.exe 2332 igfxdfp32.exe 900 igfxdfp32.exe 2616 igfxdfp32.exe 2640 igfxdfp32.exe 2800 igfxdfp32.exe 576 igfxdfp32.exe 1980 igfxdfp32.exe 1928 igfxdfp32.exe 3012 igfxdfp32.exe 2516 igfxdfp32.exe 696 igfxdfp32.exe 1808 igfxdfp32.exe 852 igfxdfp32.exe 820 igfxdfp32.exe 1572 igfxdfp32.exe 2084 igfxdfp32.exe 2692 igfxdfp32.exe 1716 igfxdfp32.exe 636 igfxdfp32.exe 2032 igfxdfp32.exe 2024 igfxdfp32.exe 2948 igfxdfp32.exe 2728 igfxdfp32.exe 1552 igfxdfp32.exe 2244 igfxdfp32.exe 2348 igfxdfp32.exe 1036 igfxdfp32.exe 2544 igfxdfp32.exe 2600 igfxdfp32.exe 1112 igfxdfp32.exe 1252 igfxdfp32.exe 2624 igfxdfp32.exe 676 igfxdfp32.exe 1244 igfxdfp32.exe -
Suspicious use of SetWindowsHookEx 56 IoCs
pid Process 2512 c74dd01a21871c8a57a96b51bf164f0c_JaffaCakes118.exe 2268 igfxdfp32.exe 2804 igfxdfp32.exe 2192 igfxdfp32.exe 2604 igfxdfp32.exe 2712 igfxdfp32.exe 2980 igfxdfp32.exe 2516 igfxdfp32.exe 2224 igfxdfp32.exe 1808 igfxdfp32.exe 2172 igfxdfp32.exe 320 igfxdfp32.exe 2072 igfxdfp32.exe 2828 igfxdfp32.exe 2116 igfxdfp32.exe 2868 igfxdfp32.exe 2636 igfxdfp32.exe 768 igfxdfp32.exe 1940 igfxdfp32.exe 2916 igfxdfp32.exe 1644 igfxdfp32.exe 2196 igfxdfp32.exe 1744 igfxdfp32.exe 1500 igfxdfp32.exe 2680 igfxdfp32.exe 2808 igfxdfp32.exe 1728 igfxdfp32.exe 1640 igfxdfp32.exe 2524 igfxdfp32.exe 496 igfxdfp32.exe 2080 igfxdfp32.exe 1244 igfxdfp32.exe 1384 igfxdfp32.exe 2352 igfxdfp32.exe 904 igfxdfp32.exe 1628 igfxdfp32.exe 1092 igfxdfp32.exe 2432 igfxdfp32.exe 2564 igfxdfp32.exe 1656 igfxdfp32.exe 1640 igfxdfp32.exe 1620 igfxdfp32.exe 1860 igfxdfp32.exe 1792 igfxdfp32.exe 1508 igfxdfp32.exe 692 igfxdfp32.exe 2476 igfxdfp32.exe 2508 igfxdfp32.exe 2176 igfxdfp32.exe 1972 igfxdfp32.exe 2828 igfxdfp32.exe 1700 igfxdfp32.exe 2596 igfxdfp32.exe 2776 igfxdfp32.exe 1568 igfxdfp32.exe 1364 igfxdfp32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2484 2512 c74dd01a21871c8a57a96b51bf164f0c_JaffaCakes118.exe 31 PID 2512 wrote to memory of 2484 2512 c74dd01a21871c8a57a96b51bf164f0c_JaffaCakes118.exe 31 PID 2512 wrote to memory of 2484 2512 c74dd01a21871c8a57a96b51bf164f0c_JaffaCakes118.exe 31 PID 2512 wrote to memory of 2484 2512 c74dd01a21871c8a57a96b51bf164f0c_JaffaCakes118.exe 31 PID 2512 wrote to memory of 2484 2512 c74dd01a21871c8a57a96b51bf164f0c_JaffaCakes118.exe 31 PID 2512 wrote to memory of 2484 2512 c74dd01a21871c8a57a96b51bf164f0c_JaffaCakes118.exe 31 PID 2512 wrote to memory of 2484 2512 c74dd01a21871c8a57a96b51bf164f0c_JaffaCakes118.exe 31 PID 2512 wrote to memory of 2484 2512 c74dd01a21871c8a57a96b51bf164f0c_JaffaCakes118.exe 31 PID 2484 wrote to memory of 2268 2484 c74dd01a21871c8a57a96b51bf164f0c_JaffaCakes118.exe 32 PID 2484 wrote to memory of 2268 2484 c74dd01a21871c8a57a96b51bf164f0c_JaffaCakes118.exe 32 PID 2484 wrote to memory of 2268 2484 c74dd01a21871c8a57a96b51bf164f0c_JaffaCakes118.exe 32 PID 2484 wrote to memory of 2268 2484 c74dd01a21871c8a57a96b51bf164f0c_JaffaCakes118.exe 32 PID 2268 wrote to memory of 2900 2268 igfxdfp32.exe 33 PID 2268 wrote to memory of 2900 2268 igfxdfp32.exe 33 PID 2268 wrote to memory of 2900 2268 igfxdfp32.exe 33 PID 2268 wrote to memory of 2900 2268 igfxdfp32.exe 33 PID 2268 wrote to memory of 2900 2268 igfxdfp32.exe 33 PID 2268 wrote to memory of 2900 2268 igfxdfp32.exe 33 PID 2268 wrote to memory of 2900 2268 igfxdfp32.exe 33 PID 2268 wrote to memory of 2900 2268 igfxdfp32.exe 33 PID 2900 wrote to memory of 2804 2900 igfxdfp32.exe 34 PID 2900 wrote to memory of 2804 2900 igfxdfp32.exe 34 PID 2900 wrote to memory of 2804 2900 igfxdfp32.exe 34 PID 2900 wrote to memory of 2804 2900 igfxdfp32.exe 34 PID 2804 wrote to memory of 2700 2804 igfxdfp32.exe 35 PID 2804 wrote to memory of 2700 2804 igfxdfp32.exe 35 PID 2804 wrote to memory of 2700 2804 igfxdfp32.exe 35 PID 2804 wrote to memory of 2700 2804 igfxdfp32.exe 35 PID 2804 wrote to memory of 2700 2804 igfxdfp32.exe 35 PID 2804 wrote to memory of 2700 2804 igfxdfp32.exe 35 PID 2804 wrote to memory of 2700 2804 igfxdfp32.exe 35 PID 2804 wrote to memory of 2700 2804 igfxdfp32.exe 35 PID 2700 wrote to memory of 2192 2700 igfxdfp32.exe 36 PID 2700 wrote to memory of 2192 2700 igfxdfp32.exe 36 PID 2700 wrote to memory of 2192 2700 igfxdfp32.exe 36 PID 2700 wrote to memory of 2192 2700 igfxdfp32.exe 36 PID 2192 wrote to memory of 1676 2192 igfxdfp32.exe 37 PID 2192 wrote to memory of 1676 2192 igfxdfp32.exe 37 PID 2192 wrote to memory of 1676 2192 igfxdfp32.exe 37 PID 2192 wrote to memory of 1676 2192 igfxdfp32.exe 37 PID 2192 wrote to memory of 1676 2192 igfxdfp32.exe 37 PID 2192 wrote to memory of 1676 2192 igfxdfp32.exe 37 PID 2192 wrote to memory of 1676 2192 igfxdfp32.exe 37 PID 2192 wrote to memory of 1676 2192 igfxdfp32.exe 37 PID 1676 wrote to memory of 2604 1676 igfxdfp32.exe 38 PID 1676 wrote to memory of 2604 1676 igfxdfp32.exe 38 PID 1676 wrote to memory of 2604 1676 igfxdfp32.exe 38 PID 1676 wrote to memory of 2604 1676 igfxdfp32.exe 38 PID 2604 wrote to memory of 988 2604 igfxdfp32.exe 39 PID 2604 wrote to memory of 988 2604 igfxdfp32.exe 39 PID 2604 wrote to memory of 988 2604 igfxdfp32.exe 39 PID 2604 wrote to memory of 988 2604 igfxdfp32.exe 39 PID 2604 wrote to memory of 988 2604 igfxdfp32.exe 39 PID 2604 wrote to memory of 988 2604 igfxdfp32.exe 39 PID 2604 wrote to memory of 988 2604 igfxdfp32.exe 39 PID 2604 wrote to memory of 988 2604 igfxdfp32.exe 39 PID 988 wrote to memory of 2712 988 igfxdfp32.exe 40 PID 988 wrote to memory of 2712 988 igfxdfp32.exe 40 PID 988 wrote to memory of 2712 988 igfxdfp32.exe 40 PID 988 wrote to memory of 2712 988 igfxdfp32.exe 40 PID 2712 wrote to memory of 1376 2712 igfxdfp32.exe 41 PID 2712 wrote to memory of 1376 2712 igfxdfp32.exe 41 PID 2712 wrote to memory of 1376 2712 igfxdfp32.exe 41 PID 2712 wrote to memory of 1376 2712 igfxdfp32.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\c74dd01a21871c8a57a96b51bf164f0c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c74dd01a21871c8a57a96b51bf164f0c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\c74dd01a21871c8a57a96b51bf164f0c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c74dd01a21871c8a57a96b51bf164f0c_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Users\Admin\AppData\Local\Temp\C74DD0~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Users\Admin\AppData\Local\Temp\C74DD0~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1376 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2980 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2100 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2516 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2920 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2224 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1008 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1808 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1080 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2172 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2884 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:320 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1772 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2072 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2684 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2828 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2804 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2116 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1960 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2868 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2720 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2636 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE34⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1936 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:768 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE36⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1820 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1940 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE38⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:448 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2916 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE40⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1608 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1644 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE42⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:688 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2196 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE44⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2332 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1744 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE46⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:900 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1500 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE48⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2616 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2680 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE50⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2640 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2808 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE52⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2800 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1728 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE54⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:576 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1640 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE56⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1980 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2524 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE58⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:1928 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:496 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE60⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3012 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2080 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE62⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2516 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1244 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE64⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:696 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1384 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE66⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1808 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE67⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2352 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE68⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:852 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE69⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:904 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE70⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:820 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE71⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1628 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE72⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1572 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE73⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1092 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE74⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2084 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE75⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2432 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE76⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2692 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE77⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2564 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE78⤵
- Suspicious behavior: EnumeratesProcesses
PID:1716 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE79⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1656 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE80⤵
- Suspicious behavior: EnumeratesProcesses
PID:636 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE81⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1640 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE82⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2032 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE83⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1620 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE84⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2024 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE85⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1860 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE86⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2948 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE87⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1792 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE88⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2728 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE89⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1508 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE90⤵
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:1552 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE91⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:692 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE92⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2244 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE93⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2476 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE94⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2348 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE95⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2508 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE96⤵
- Maps connected drives based on registry
PID:2344 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE97⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2176 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE98⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1036 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE99⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1972 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE100⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2544 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE101⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2828 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE102⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2600 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE103⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1700 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE104⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1112 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE105⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2596 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE106⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1252 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE107⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2776 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE108⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2624 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE109⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1568 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE110⤵
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:676 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\system32\igfxdfp32.exe" C:\Windows\SysWOW64\IGFXDF~1.EXE111⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1364 -
C:\Windows\SysWOW64\igfxdfp32.exe"C:\Windows\SysWOW64\igfxdfp32.exe " C:\Windows\SysWOW64\IGFXDF~1.EXE112⤵
- Suspicious behavior: EnumeratesProcesses
PID:1244
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD5c74dd01a21871c8a57a96b51bf164f0c
SHA193689e714be0e4930799e661acd40fcd1ccb55b1
SHA2560a011d41ad1664fddeb76d929e0ab5e746a08af71cedddc5c2efcda49e6d5bba
SHA51255c09c40a84f9bdd7e72906dc999465f3802dc9e26e8828107bc847267691347df269b5679ce7123c7210ec0b6b2a4890dab00df42c88b9337302c1e8fee0744