Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 06:39
Static task
static1
Behavioral task
behavioral1
Sample
dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe
-
Size
528KB
-
MD5
dd7739debcc86b185525754bf0285d2c
-
SHA1
828d8bb036f952dba2b1846a239ef1e833fc5654
-
SHA256
2b51f15f63b25db5fa9cc9bbf94fd17728a117853ff4e7889b85109365f25f5f
-
SHA512
132c860ec79ede1ab7c971d4c960cd94e5322e69a69aceacaa06771d0d76aa260d0f068ff6870843596d1cf5fb1ae6f0b7bd7f612575111e0d46fb0320bd4b08
-
SSDEEP
12288:F/1L+W3eEQKhksGN5qrdSgiUjEevMWif3gG:F/x+wGUGN5qUgiUjEevxG
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 41 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation igfxdpc32.exe -
Deletes itself 1 IoCs
pid Process 1908 igfxdpc32.exe -
Executes dropped EXE 41 IoCs
pid Process 1908 igfxdpc32.exe 3476 igfxdpc32.exe 1784 igfxdpc32.exe 1680 igfxdpc32.exe 2216 igfxdpc32.exe 1540 igfxdpc32.exe 1892 igfxdpc32.exe 4144 igfxdpc32.exe 3716 igfxdpc32.exe 4388 igfxdpc32.exe 2988 igfxdpc32.exe 2608 igfxdpc32.exe 4808 igfxdpc32.exe 224 igfxdpc32.exe 2836 igfxdpc32.exe 3548 igfxdpc32.exe 4472 igfxdpc32.exe 3488 igfxdpc32.exe 1912 igfxdpc32.exe 1696 igfxdpc32.exe 4072 igfxdpc32.exe 3004 igfxdpc32.exe 4636 igfxdpc32.exe 1704 igfxdpc32.exe 2216 igfxdpc32.exe 4812 igfxdpc32.exe 3184 igfxdpc32.exe 4480 igfxdpc32.exe 4952 igfxdpc32.exe 720 igfxdpc32.exe 2820 igfxdpc32.exe 3236 igfxdpc32.exe 2588 igfxdpc32.exe 4764 igfxdpc32.exe 3052 igfxdpc32.exe 1876 igfxdpc32.exe 5048 igfxdpc32.exe 1972 igfxdpc32.exe 1504 igfxdpc32.exe 3152 igfxdpc32.exe 4276 igfxdpc32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 41 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe -
Modifies registry class 41 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe 1908 igfxdpc32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 848 wrote to memory of 1908 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 84 PID 848 wrote to memory of 1908 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 84 PID 848 wrote to memory of 1908 848 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 84 PID 1908 wrote to memory of 3476 1908 igfxdpc32.exe 85 PID 1908 wrote to memory of 3476 1908 igfxdpc32.exe 85 PID 1908 wrote to memory of 3476 1908 igfxdpc32.exe 85 PID 3476 wrote to memory of 1784 3476 igfxdpc32.exe 92 PID 3476 wrote to memory of 1784 3476 igfxdpc32.exe 92 PID 3476 wrote to memory of 1784 3476 igfxdpc32.exe 92 PID 1784 wrote to memory of 1680 1784 igfxdpc32.exe 95 PID 1784 wrote to memory of 1680 1784 igfxdpc32.exe 95 PID 1784 wrote to memory of 1680 1784 igfxdpc32.exe 95 PID 1680 wrote to memory of 2216 1680 igfxdpc32.exe 100 PID 1680 wrote to memory of 2216 1680 igfxdpc32.exe 100 PID 1680 wrote to memory of 2216 1680 igfxdpc32.exe 100 PID 2216 wrote to memory of 1540 2216 igfxdpc32.exe 101 PID 2216 wrote to memory of 1540 2216 igfxdpc32.exe 101 PID 2216 wrote to memory of 1540 2216 igfxdpc32.exe 101 PID 1540 wrote to memory of 1892 1540 igfxdpc32.exe 102 PID 1540 wrote to memory of 1892 1540 igfxdpc32.exe 102 PID 1540 wrote to memory of 1892 1540 igfxdpc32.exe 102 PID 1892 wrote to memory of 4144 1892 igfxdpc32.exe 103 PID 1892 wrote to memory of 4144 1892 igfxdpc32.exe 103 PID 1892 wrote to memory of 4144 1892 igfxdpc32.exe 103 PID 4144 wrote to memory of 3716 4144 igfxdpc32.exe 106 PID 4144 wrote to memory of 3716 4144 igfxdpc32.exe 106 PID 4144 wrote to memory of 3716 4144 igfxdpc32.exe 106 PID 3716 wrote to memory of 4388 3716 igfxdpc32.exe 108 PID 3716 wrote to memory of 4388 3716 igfxdpc32.exe 108 PID 3716 wrote to memory of 4388 3716 igfxdpc32.exe 108 PID 4388 wrote to memory of 2988 4388 igfxdpc32.exe 109 PID 4388 wrote to memory of 2988 4388 igfxdpc32.exe 109 PID 4388 wrote to memory of 2988 4388 igfxdpc32.exe 109 PID 2988 wrote to memory of 2608 2988 igfxdpc32.exe 110 PID 2988 wrote to memory of 2608 2988 igfxdpc32.exe 110 PID 2988 wrote to memory of 2608 2988 igfxdpc32.exe 110 PID 2608 wrote to memory of 4808 2608 igfxdpc32.exe 111 PID 2608 wrote to memory of 4808 2608 igfxdpc32.exe 111 PID 2608 wrote to memory of 4808 2608 igfxdpc32.exe 111 PID 4808 wrote to memory of 224 4808 igfxdpc32.exe 112 PID 4808 wrote to memory of 224 4808 igfxdpc32.exe 112 PID 4808 wrote to memory of 224 4808 igfxdpc32.exe 112 PID 224 wrote to memory of 2836 224 igfxdpc32.exe 113 PID 224 wrote to memory of 2836 224 igfxdpc32.exe 113 PID 224 wrote to memory of 2836 224 igfxdpc32.exe 113 PID 2836 wrote to memory of 3548 2836 igfxdpc32.exe 114 PID 2836 wrote to memory of 3548 2836 igfxdpc32.exe 114 PID 2836 wrote to memory of 3548 2836 igfxdpc32.exe 114 PID 3548 wrote to memory of 4472 3548 igfxdpc32.exe 115 PID 3548 wrote to memory of 4472 3548 igfxdpc32.exe 115 PID 3548 wrote to memory of 4472 3548 igfxdpc32.exe 115 PID 4472 wrote to memory of 3488 4472 igfxdpc32.exe 116 PID 4472 wrote to memory of 3488 4472 igfxdpc32.exe 116 PID 4472 wrote to memory of 3488 4472 igfxdpc32.exe 116 PID 3488 wrote to memory of 1912 3488 igfxdpc32.exe 117 PID 3488 wrote to memory of 1912 3488 igfxdpc32.exe 117 PID 3488 wrote to memory of 1912 3488 igfxdpc32.exe 117 PID 1912 wrote to memory of 1696 1912 igfxdpc32.exe 118 PID 1912 wrote to memory of 1696 1912 igfxdpc32.exe 118 PID 1912 wrote to memory of 1696 1912 igfxdpc32.exe 118 PID 1696 wrote to memory of 4072 1696 igfxdpc32.exe 119 PID 1696 wrote to memory of 4072 1696 igfxdpc32.exe 119 PID 1696 wrote to memory of 4072 1696 igfxdpc32.exe 119 PID 4072 wrote to memory of 3004 4072 igfxdpc32.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Users\Admin\AppData\Local\Temp\DD7739~1.EXE2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE3⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE5⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE7⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE9⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE11⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE13⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE15⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE17⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE19⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE21⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE23⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3004 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4636 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE25⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1704 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2216 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE27⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4812 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3184 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE29⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4480 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4952 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE31⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:720 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2820 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE33⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3236 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2588 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE35⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4764 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3052 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE37⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1876 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5048 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE39⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1972 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1504 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE41⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3152 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE42⤵
- Executes dropped EXE
- Maps connected drives based on registry
PID:4276
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
528KB
MD5dd7739debcc86b185525754bf0285d2c
SHA1828d8bb036f952dba2b1846a239ef1e833fc5654
SHA2562b51f15f63b25db5fa9cc9bbf94fd17728a117853ff4e7889b85109365f25f5f
SHA512132c860ec79ede1ab7c971d4c960cd94e5322e69a69aceacaa06771d0d76aa260d0f068ff6870843596d1cf5fb1ae6f0b7bd7f612575111e0d46fb0320bd4b08