Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 19:16
Static task
static1
Behavioral task
behavioral1
Sample
de44c57d1250801ba11dd8e99f9e4f03_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
de44c57d1250801ba11dd8e99f9e4f03_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
de44c57d1250801ba11dd8e99f9e4f03_JaffaCakes118.exe
-
Size
284KB
-
MD5
de44c57d1250801ba11dd8e99f9e4f03
-
SHA1
e33a1a4f3e7c6975ff349ef81fcbf642d2586616
-
SHA256
c0cc8f045de288c4c5e92c0276fdd0ae98eb91bbe6185c8ab2f3f94cf1d731e8
-
SHA512
f69fce485e025aa707c2e6681df3931917ee5aba376f73db9d9aec7e147770cb8ae12adeeaf0b65592956e711566fbdda80ed3da8290fab144a2f6a531d5e665
-
SSDEEP
3072:Z1VMYoCc7mydRtMjVfw5uXtB2yfScsvxFTNSoZ7EuoCc7mydRtMjVfw5uXtB2yfY:yNRtMjVf+affzc4ZNRtMjVf+affzc4Q
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2100 igfxtray32.exe -
Executes dropped EXE 64 IoCs
pid Process 1672 igfxtray32.exe 2100 igfxtray32.exe 2804 igfxtray32.exe 2712 igfxtray32.exe 1696 igfxtray32.exe 2624 igfxtray32.exe 1288 igfxtray32.exe 2820 igfxtray32.exe 2620 igfxtray32.exe 2004 igfxtray32.exe 2968 igfxtray32.exe 1972 igfxtray32.exe 2328 igfxtray32.exe 2224 igfxtray32.exe 2424 igfxtray32.exe 608 igfxtray32.exe 760 igfxtray32.exe 2232 igfxtray32.exe 2432 igfxtray32.exe 852 igfxtray32.exe 1300 igfxtray32.exe 2636 igfxtray32.exe 2660 igfxtray32.exe 2752 igfxtray32.exe 2452 igfxtray32.exe 2576 igfxtray32.exe 2584 igfxtray32.exe 2144 igfxtray32.exe 2848 igfxtray32.exe 2836 igfxtray32.exe 532 igfxtray32.exe 544 igfxtray32.exe 2856 igfxtray32.exe 2872 igfxtray32.exe 2192 igfxtray32.exe 2244 igfxtray32.exe 1076 igfxtray32.exe 1396 igfxtray32.exe 1048 igfxtray32.exe 1724 igfxtray32.exe 2400 igfxtray32.exe 2952 igfxtray32.exe 1496 igfxtray32.exe 1732 igfxtray32.exe 1588 igfxtray32.exe 992 igfxtray32.exe 2360 igfxtray32.exe 2344 igfxtray32.exe 2772 igfxtray32.exe 2824 igfxtray32.exe 2568 igfxtray32.exe 2564 igfxtray32.exe 2008 igfxtray32.exe 2380 igfxtray32.exe 1240 igfxtray32.exe 2296 igfxtray32.exe 1832 igfxtray32.exe 2984 igfxtray32.exe 3016 igfxtray32.exe 2200 igfxtray32.exe 892 igfxtray32.exe 536 igfxtray32.exe 2440 igfxtray32.exe 812 igfxtray32.exe -
Loads dropped DLL 64 IoCs
pid Process 2496 de44c57d1250801ba11dd8e99f9e4f03_JaffaCakes118.exe 2496 de44c57d1250801ba11dd8e99f9e4f03_JaffaCakes118.exe 2100 igfxtray32.exe 2100 igfxtray32.exe 2712 igfxtray32.exe 2712 igfxtray32.exe 2624 igfxtray32.exe 2624 igfxtray32.exe 2820 igfxtray32.exe 2820 igfxtray32.exe 2004 igfxtray32.exe 2004 igfxtray32.exe 1972 igfxtray32.exe 1972 igfxtray32.exe 2224 igfxtray32.exe 2224 igfxtray32.exe 608 igfxtray32.exe 608 igfxtray32.exe 2232 igfxtray32.exe 2232 igfxtray32.exe 852 igfxtray32.exe 852 igfxtray32.exe 2636 igfxtray32.exe 2636 igfxtray32.exe 2752 igfxtray32.exe 2752 igfxtray32.exe 2576 igfxtray32.exe 2576 igfxtray32.exe 2144 igfxtray32.exe 2144 igfxtray32.exe 2836 igfxtray32.exe 2836 igfxtray32.exe 544 igfxtray32.exe 544 igfxtray32.exe 2872 igfxtray32.exe 2872 igfxtray32.exe 2244 igfxtray32.exe 2244 igfxtray32.exe 1396 igfxtray32.exe 1396 igfxtray32.exe 1724 igfxtray32.exe 1724 igfxtray32.exe 2952 igfxtray32.exe 2952 igfxtray32.exe 1732 igfxtray32.exe 1732 igfxtray32.exe 992 igfxtray32.exe 992 igfxtray32.exe 2344 igfxtray32.exe 2344 igfxtray32.exe 2824 igfxtray32.exe 2824 igfxtray32.exe 2564 igfxtray32.exe 2564 igfxtray32.exe 2380 igfxtray32.exe 2380 igfxtray32.exe 2296 igfxtray32.exe 2296 igfxtray32.exe 2984 igfxtray32.exe 2984 igfxtray32.exe 2200 igfxtray32.exe 2200 igfxtray32.exe 536 igfxtray32.exe 536 igfxtray32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtray32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxtray32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxtray32.exe File opened for modification C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File created C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File opened for modification C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File created C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File opened for modification C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File opened for modification C:\Windows\SysWOW64\ igfxtray32.exe File created C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File opened for modification C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File opened for modification C:\Windows\SysWOW64\ igfxtray32.exe File opened for modification C:\Windows\SysWOW64\ igfxtray32.exe File created C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File created C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File created C:\Windows\SysWOW64\igfxtray32.exe de44c57d1250801ba11dd8e99f9e4f03_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File opened for modification C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File opened for modification C:\Windows\SysWOW64\ igfxtray32.exe File created C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File created C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File opened for modification C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File opened for modification C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File opened for modification C:\Windows\SysWOW64\ igfxtray32.exe File opened for modification C:\Windows\SysWOW64\ igfxtray32.exe File created C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File created C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File opened for modification C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File opened for modification C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File opened for modification C:\Windows\SysWOW64\ igfxtray32.exe File created C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File opened for modification C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File opened for modification C:\Windows\SysWOW64\ igfxtray32.exe File opened for modification C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File opened for modification C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File created C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File opened for modification C:\Windows\SysWOW64\ igfxtray32.exe File opened for modification C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File created C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File opened for modification C:\Windows\SysWOW64\ igfxtray32.exe File opened for modification C:\Windows\SysWOW64\ igfxtray32.exe File created C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File opened for modification C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File opened for modification C:\Windows\SysWOW64\ igfxtray32.exe File opened for modification C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File created C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File opened for modification C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File opened for modification C:\Windows\SysWOW64\ igfxtray32.exe File opened for modification C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File created C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File opened for modification C:\Windows\SysWOW64\ igfxtray32.exe File created C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File opened for modification C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File opened for modification C:\Windows\SysWOW64\ igfxtray32.exe File created C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File created C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File opened for modification C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File opened for modification C:\Windows\SysWOW64\ igfxtray32.exe File opened for modification C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File created C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File opened for modification C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File opened for modification C:\Windows\SysWOW64\ igfxtray32.exe File created C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File created C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File opened for modification C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe File created C:\Windows\SysWOW64\igfxtray32.exe igfxtray32.exe -
Suspicious use of SetThreadContext 55 IoCs
description pid Process procid_target PID 1540 set thread context of 2496 1540 de44c57d1250801ba11dd8e99f9e4f03_JaffaCakes118.exe 30 PID 1672 set thread context of 2100 1672 igfxtray32.exe 32 PID 2804 set thread context of 2712 2804 igfxtray32.exe 34 PID 1696 set thread context of 2624 1696 igfxtray32.exe 36 PID 1288 set thread context of 2820 1288 igfxtray32.exe 38 PID 2620 set thread context of 2004 2620 igfxtray32.exe 40 PID 2968 set thread context of 1972 2968 igfxtray32.exe 43 PID 2328 set thread context of 2224 2328 igfxtray32.exe 45 PID 2424 set thread context of 608 2424 igfxtray32.exe 47 PID 760 set thread context of 2232 760 igfxtray32.exe 49 PID 2432 set thread context of 852 2432 igfxtray32.exe 51 PID 1300 set thread context of 2636 1300 igfxtray32.exe 53 PID 2660 set thread context of 2752 2660 igfxtray32.exe 55 PID 2452 set thread context of 2576 2452 igfxtray32.exe 57 PID 2584 set thread context of 2144 2584 igfxtray32.exe 59 PID 2848 set thread context of 2836 2848 igfxtray32.exe 61 PID 532 set thread context of 544 532 igfxtray32.exe 63 PID 2856 set thread context of 2872 2856 igfxtray32.exe 65 PID 2192 set thread context of 2244 2192 igfxtray32.exe 67 PID 1076 set thread context of 1396 1076 igfxtray32.exe 69 PID 1048 set thread context of 1724 1048 igfxtray32.exe 71 PID 2400 set thread context of 2952 2400 igfxtray32.exe 73 PID 1496 set thread context of 1732 1496 igfxtray32.exe 75 PID 1588 set thread context of 992 1588 igfxtray32.exe 77 PID 2360 set thread context of 2344 2360 igfxtray32.exe 79 PID 2772 set thread context of 2824 2772 igfxtray32.exe 81 PID 2568 set thread context of 2564 2568 igfxtray32.exe 83 PID 2008 set thread context of 2380 2008 igfxtray32.exe 85 PID 1240 set thread context of 2296 1240 igfxtray32.exe 87 PID 1832 set thread context of 2984 1832 igfxtray32.exe 89 PID 3016 set thread context of 2200 3016 igfxtray32.exe 91 PID 892 set thread context of 536 892 igfxtray32.exe 93 PID 2440 set thread context of 812 2440 igfxtray32.exe 95 PID 1844 set thread context of 2256 1844 igfxtray32.exe 97 PID 1144 set thread context of 2132 1144 igfxtray32.exe 99 PID 1720 set thread context of 1964 1720 igfxtray32.exe 101 PID 1780 set thread context of 2136 1780 igfxtray32.exe 103 PID 2472 set thread context of 2660 2472 igfxtray32.exe 105 PID 1904 set thread context of 2452 1904 igfxtray32.exe 107 PID 2724 set thread context of 2116 2724 igfxtray32.exe 109 PID 580 set thread context of 860 580 igfxtray32.exe 111 PID 1952 set thread context of 2620 1952 igfxtray32.exe 113 PID 2408 set thread context of 532 2408 igfxtray32.exe 115 PID 920 set thread context of 2856 920 igfxtray32.exe 117 PID 1960 set thread context of 1736 1960 igfxtray32.exe 119 PID 1324 set thread context of 884 1324 igfxtray32.exe 121 PID 1636 set thread context of 2400 1636 igfxtray32.exe 123 PID 2140 set thread context of 1552 2140 igfxtray32.exe 125 PID 1272 set thread context of 1524 1272 igfxtray32.exe 127 PID 2352 set thread context of 2696 2352 igfxtray32.exe 129 PID 2412 set thread context of 2704 2412 igfxtray32.exe 131 PID 2692 set thread context of 2992 2692 igfxtray32.exe 133 PID 2548 set thread context of 1444 2548 igfxtray32.exe 135 PID 2088 set thread context of 1848 2088 igfxtray32.exe 137 PID 1912 set thread context of 1832 1912 igfxtray32.exe 139 -
resource yara_rule behavioral1/memory/2496-6-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2496-9-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2496-14-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2496-13-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2496-12-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2496-11-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2496-4-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2496-27-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2100-41-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2100-40-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2100-39-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2100-38-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2100-47-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2712-57-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2712-60-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2712-59-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2712-58-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2712-66-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2624-79-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2624-78-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2624-77-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2624-76-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2624-85-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2820-98-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2820-97-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2820-96-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2820-95-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2820-104-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2004-117-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2004-125-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1972-133-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1972-143-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2224-161-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/608-182-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2232-198-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/852-217-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2636-235-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2752-254-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2576-272-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2144-286-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2836-300-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/544-314-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2872-328-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2244-342-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1396-356-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1724-370-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2952-384-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1732-398-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/992-412-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2344-426-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2824-440-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2564-454-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2380-468-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2296-482-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2984-498-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2200-510-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/536-524-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/812-538-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2256-552-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2132-566-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1964-580-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2136-594-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2660-608-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2452-622-0x0000000000400000-0x000000000045B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de44c57d1250801ba11dd8e99f9e4f03_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de44c57d1250801ba11dd8e99f9e4f03_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtray32.exe -
Suspicious behavior: EnumeratesProcesses 55 IoCs
pid Process 2496 de44c57d1250801ba11dd8e99f9e4f03_JaffaCakes118.exe 2100 igfxtray32.exe 2712 igfxtray32.exe 2624 igfxtray32.exe 2820 igfxtray32.exe 2004 igfxtray32.exe 1972 igfxtray32.exe 2224 igfxtray32.exe 608 igfxtray32.exe 2232 igfxtray32.exe 852 igfxtray32.exe 2636 igfxtray32.exe 2752 igfxtray32.exe 2576 igfxtray32.exe 2144 igfxtray32.exe 2836 igfxtray32.exe 544 igfxtray32.exe 2872 igfxtray32.exe 2244 igfxtray32.exe 1396 igfxtray32.exe 1724 igfxtray32.exe 2952 igfxtray32.exe 1732 igfxtray32.exe 992 igfxtray32.exe 2344 igfxtray32.exe 2824 igfxtray32.exe 2564 igfxtray32.exe 2380 igfxtray32.exe 2296 igfxtray32.exe 2984 igfxtray32.exe 2200 igfxtray32.exe 536 igfxtray32.exe 812 igfxtray32.exe 2256 igfxtray32.exe 2132 igfxtray32.exe 1964 igfxtray32.exe 2136 igfxtray32.exe 2660 igfxtray32.exe 2452 igfxtray32.exe 2116 igfxtray32.exe 860 igfxtray32.exe 2620 igfxtray32.exe 532 igfxtray32.exe 2856 igfxtray32.exe 1736 igfxtray32.exe 884 igfxtray32.exe 2400 igfxtray32.exe 1552 igfxtray32.exe 1524 igfxtray32.exe 2696 igfxtray32.exe 2704 igfxtray32.exe 2992 igfxtray32.exe 1444 igfxtray32.exe 1848 igfxtray32.exe 1832 igfxtray32.exe -
Suspicious use of SetWindowsHookEx 55 IoCs
pid Process 1540 de44c57d1250801ba11dd8e99f9e4f03_JaffaCakes118.exe 1672 igfxtray32.exe 2804 igfxtray32.exe 1696 igfxtray32.exe 1288 igfxtray32.exe 2620 igfxtray32.exe 2968 igfxtray32.exe 2328 igfxtray32.exe 2424 igfxtray32.exe 760 igfxtray32.exe 2432 igfxtray32.exe 1300 igfxtray32.exe 2660 igfxtray32.exe 2452 igfxtray32.exe 2584 igfxtray32.exe 2848 igfxtray32.exe 532 igfxtray32.exe 2856 igfxtray32.exe 2192 igfxtray32.exe 1076 igfxtray32.exe 1048 igfxtray32.exe 2400 igfxtray32.exe 1496 igfxtray32.exe 1588 igfxtray32.exe 2360 igfxtray32.exe 2772 igfxtray32.exe 2568 igfxtray32.exe 2008 igfxtray32.exe 1240 igfxtray32.exe 1832 igfxtray32.exe 3016 igfxtray32.exe 892 igfxtray32.exe 2440 igfxtray32.exe 1844 igfxtray32.exe 1144 igfxtray32.exe 1720 igfxtray32.exe 1780 igfxtray32.exe 2472 igfxtray32.exe 1904 igfxtray32.exe 2724 igfxtray32.exe 580 igfxtray32.exe 1952 igfxtray32.exe 2408 igfxtray32.exe 920 igfxtray32.exe 1960 igfxtray32.exe 1324 igfxtray32.exe 1636 igfxtray32.exe 2140 igfxtray32.exe 1272 igfxtray32.exe 2352 igfxtray32.exe 2412 igfxtray32.exe 2692 igfxtray32.exe 2548 igfxtray32.exe 2088 igfxtray32.exe 1912 igfxtray32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2496 1540 de44c57d1250801ba11dd8e99f9e4f03_JaffaCakes118.exe 30 PID 1540 wrote to memory of 2496 1540 de44c57d1250801ba11dd8e99f9e4f03_JaffaCakes118.exe 30 PID 1540 wrote to memory of 2496 1540 de44c57d1250801ba11dd8e99f9e4f03_JaffaCakes118.exe 30 PID 1540 wrote to memory of 2496 1540 de44c57d1250801ba11dd8e99f9e4f03_JaffaCakes118.exe 30 PID 1540 wrote to memory of 2496 1540 de44c57d1250801ba11dd8e99f9e4f03_JaffaCakes118.exe 30 PID 1540 wrote to memory of 2496 1540 de44c57d1250801ba11dd8e99f9e4f03_JaffaCakes118.exe 30 PID 1540 wrote to memory of 2496 1540 de44c57d1250801ba11dd8e99f9e4f03_JaffaCakes118.exe 30 PID 1540 wrote to memory of 2496 1540 de44c57d1250801ba11dd8e99f9e4f03_JaffaCakes118.exe 30 PID 2496 wrote to memory of 1672 2496 de44c57d1250801ba11dd8e99f9e4f03_JaffaCakes118.exe 31 PID 2496 wrote to memory of 1672 2496 de44c57d1250801ba11dd8e99f9e4f03_JaffaCakes118.exe 31 PID 2496 wrote to memory of 1672 2496 de44c57d1250801ba11dd8e99f9e4f03_JaffaCakes118.exe 31 PID 2496 wrote to memory of 1672 2496 de44c57d1250801ba11dd8e99f9e4f03_JaffaCakes118.exe 31 PID 1672 wrote to memory of 2100 1672 igfxtray32.exe 32 PID 1672 wrote to memory of 2100 1672 igfxtray32.exe 32 PID 1672 wrote to memory of 2100 1672 igfxtray32.exe 32 PID 1672 wrote to memory of 2100 1672 igfxtray32.exe 32 PID 1672 wrote to memory of 2100 1672 igfxtray32.exe 32 PID 1672 wrote to memory of 2100 1672 igfxtray32.exe 32 PID 1672 wrote to memory of 2100 1672 igfxtray32.exe 32 PID 1672 wrote to memory of 2100 1672 igfxtray32.exe 32 PID 2100 wrote to memory of 2804 2100 igfxtray32.exe 33 PID 2100 wrote to memory of 2804 2100 igfxtray32.exe 33 PID 2100 wrote to memory of 2804 2100 igfxtray32.exe 33 PID 2100 wrote to memory of 2804 2100 igfxtray32.exe 33 PID 2804 wrote to memory of 2712 2804 igfxtray32.exe 34 PID 2804 wrote to memory of 2712 2804 igfxtray32.exe 34 PID 2804 wrote to memory of 2712 2804 igfxtray32.exe 34 PID 2804 wrote to memory of 2712 2804 igfxtray32.exe 34 PID 2804 wrote to memory of 2712 2804 igfxtray32.exe 34 PID 2804 wrote to memory of 2712 2804 igfxtray32.exe 34 PID 2804 wrote to memory of 2712 2804 igfxtray32.exe 34 PID 2804 wrote to memory of 2712 2804 igfxtray32.exe 34 PID 2712 wrote to memory of 1696 2712 igfxtray32.exe 35 PID 2712 wrote to memory of 1696 2712 igfxtray32.exe 35 PID 2712 wrote to memory of 1696 2712 igfxtray32.exe 35 PID 2712 wrote to memory of 1696 2712 igfxtray32.exe 35 PID 1696 wrote to memory of 2624 1696 igfxtray32.exe 36 PID 1696 wrote to memory of 2624 1696 igfxtray32.exe 36 PID 1696 wrote to memory of 2624 1696 igfxtray32.exe 36 PID 1696 wrote to memory of 2624 1696 igfxtray32.exe 36 PID 1696 wrote to memory of 2624 1696 igfxtray32.exe 36 PID 1696 wrote to memory of 2624 1696 igfxtray32.exe 36 PID 1696 wrote to memory of 2624 1696 igfxtray32.exe 36 PID 1696 wrote to memory of 2624 1696 igfxtray32.exe 36 PID 2624 wrote to memory of 1288 2624 igfxtray32.exe 37 PID 2624 wrote to memory of 1288 2624 igfxtray32.exe 37 PID 2624 wrote to memory of 1288 2624 igfxtray32.exe 37 PID 2624 wrote to memory of 1288 2624 igfxtray32.exe 37 PID 1288 wrote to memory of 2820 1288 igfxtray32.exe 38 PID 1288 wrote to memory of 2820 1288 igfxtray32.exe 38 PID 1288 wrote to memory of 2820 1288 igfxtray32.exe 38 PID 1288 wrote to memory of 2820 1288 igfxtray32.exe 38 PID 1288 wrote to memory of 2820 1288 igfxtray32.exe 38 PID 1288 wrote to memory of 2820 1288 igfxtray32.exe 38 PID 1288 wrote to memory of 2820 1288 igfxtray32.exe 38 PID 1288 wrote to memory of 2820 1288 igfxtray32.exe 38 PID 2820 wrote to memory of 2620 2820 igfxtray32.exe 39 PID 2820 wrote to memory of 2620 2820 igfxtray32.exe 39 PID 2820 wrote to memory of 2620 2820 igfxtray32.exe 39 PID 2820 wrote to memory of 2620 2820 igfxtray32.exe 39 PID 2620 wrote to memory of 2004 2620 igfxtray32.exe 40 PID 2620 wrote to memory of 2004 2620 igfxtray32.exe 40 PID 2620 wrote to memory of 2004 2620 igfxtray32.exe 40 PID 2620 wrote to memory of 2004 2620 igfxtray32.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\de44c57d1250801ba11dd8e99f9e4f03_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\de44c57d1250801ba11dd8e99f9e4f03_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\de44c57d1250801ba11dd8e99f9e4f03_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\de44c57d1250801ba11dd8e99f9e4f03_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Users\Admin\AppData\Local\Temp\DE44C5~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Users\Admin\AppData\Local\Temp\DE44C5~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2004 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2968 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1972 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2328 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2224 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2424 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:608 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:760 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2232 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2432 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:852 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1300 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2636 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2660 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2752 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2452 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2576 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2584 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2144 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2848 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2836 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:532 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE34⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:544 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2856 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE36⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2872 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2192 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE38⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2244 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1076 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE40⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1396 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1048 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE42⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1724 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2400 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE44⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2952 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1496 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE46⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1732 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1588 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE48⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:992 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2360 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE50⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2344 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2772 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE52⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2824 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2568 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE54⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2564 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2008 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE56⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2380 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1240 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE58⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2296 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1832 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE60⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2984 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3016 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE62⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2200 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:892 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE64⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:536 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2440 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE66⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:812 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE67⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1844 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE68⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2256 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE69⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1144 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE70⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2132 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE71⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1720 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE72⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1964 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE73⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1780 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE74⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2136 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE75⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2472 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE76⤵
- Suspicious behavior: EnumeratesProcesses
PID:2660 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE77⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1904 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE78⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2452 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE79⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2724 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE80⤵
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2116 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE81⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:580 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE82⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:860 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE83⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1952 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE84⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE85⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2408 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE86⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:532 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE87⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:920 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE88⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2856 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE89⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1960 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE90⤵
- Suspicious behavior: EnumeratesProcesses
PID:1736 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE91⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1324 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE92⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:884 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE93⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1636 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE94⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2400 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE95⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2140 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE96⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1552 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE97⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1272 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE98⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1524 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE99⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2352 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE100⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2696 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE101⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2412 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE102⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2704 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE103⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2692 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE104⤵
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2992 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE105⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2548 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE106⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1444 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE107⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2088 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE108⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1848 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\system32\igfxtray32.exe" C:\Windows\SysWOW64\IGFXTR~1.EXE109⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1912 -
C:\Windows\SysWOW64\igfxtray32.exe"C:\Windows\SysWOW64\igfxtray32.exe " C:\Windows\SysWOW64\IGFXTR~1.EXE110⤵
- Suspicious behavior: EnumeratesProcesses
PID:1832
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD5de44c57d1250801ba11dd8e99f9e4f03
SHA1e33a1a4f3e7c6975ff349ef81fcbf642d2586616
SHA256c0cc8f045de288c4c5e92c0276fdd0ae98eb91bbe6185c8ab2f3f94cf1d731e8
SHA512f69fce485e025aa707c2e6681df3931917ee5aba376f73db9d9aec7e147770cb8ae12adeeaf0b65592956e711566fbdda80ed3da8290fab144a2f6a531d5e665