Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 03:16
Behavioral task
behavioral1
Sample
dfae02a237b12f4640a32821ac650d36_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
dfae02a237b12f4640a32821ac650d36_JaffaCakes118.exe
-
Size
227KB
-
MD5
dfae02a237b12f4640a32821ac650d36
-
SHA1
bb7407abd22acb3f530c84b4a9314f773b2987c0
-
SHA256
2e14d7a10912db1ddee63cb10e86d2d291465256ab1f826b12d398af9306fe3a
-
SHA512
e1f943357a0c4d6c82f59d5eeb6503742b8eb8727e4a50333901665b249daac523d235dc1940d1f70fa0dc957f46114ba2c96979fe8288d99e47d75026d465c7
-
SSDEEP
6144:1Q7Pq9sg7xRDj0OT2GPHUFp0/2lmoSiiWv3mSDYuOk5:uPGLDX2GvUjFAo3/DYuOk
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2132 igfxper32.exe -
Executes dropped EXE 51 IoCs
pid Process 2132 igfxper32.exe 2772 igfxper32.exe 2640 igfxper32.exe 2616 igfxper32.exe 1600 igfxper32.exe 1484 igfxper32.exe 1900 igfxper32.exe 836 igfxper32.exe 1944 igfxper32.exe 2952 igfxper32.exe 1808 igfxper32.exe 408 igfxper32.exe 1268 igfxper32.exe 1376 igfxper32.exe 1948 igfxper32.exe 816 igfxper32.exe 2764 igfxper32.exe 2024 igfxper32.exe 2368 igfxper32.exe 1572 igfxper32.exe 2444 igfxper32.exe 2992 igfxper32.exe 2932 igfxper32.exe 2672 igfxper32.exe 2240 igfxper32.exe 2616 igfxper32.exe 1780 igfxper32.exe 1708 igfxper32.exe 1736 igfxper32.exe 1700 igfxper32.exe 1628 igfxper32.exe 2004 igfxper32.exe 1288 igfxper32.exe 2420 igfxper32.exe 2916 igfxper32.exe 988 igfxper32.exe 288 igfxper32.exe 1232 igfxper32.exe 604 igfxper32.exe 816 igfxper32.exe 2352 igfxper32.exe 2364 igfxper32.exe 2144 igfxper32.exe 2360 igfxper32.exe 488 igfxper32.exe 2496 igfxper32.exe 2276 igfxper32.exe 2856 igfxper32.exe 2324 igfxper32.exe 2632 igfxper32.exe 3068 igfxper32.exe -
Loads dropped DLL 64 IoCs
pid Process 2236 dfae02a237b12f4640a32821ac650d36_JaffaCakes118.exe 2236 dfae02a237b12f4640a32821ac650d36_JaffaCakes118.exe 2132 igfxper32.exe 2132 igfxper32.exe 2772 igfxper32.exe 2772 igfxper32.exe 2640 igfxper32.exe 2640 igfxper32.exe 2616 igfxper32.exe 2616 igfxper32.exe 1600 igfxper32.exe 1600 igfxper32.exe 1484 igfxper32.exe 1484 igfxper32.exe 1900 igfxper32.exe 1900 igfxper32.exe 836 igfxper32.exe 836 igfxper32.exe 1944 igfxper32.exe 1944 igfxper32.exe 2952 igfxper32.exe 2952 igfxper32.exe 1808 igfxper32.exe 1808 igfxper32.exe 408 igfxper32.exe 408 igfxper32.exe 1268 igfxper32.exe 1268 igfxper32.exe 1376 igfxper32.exe 1376 igfxper32.exe 1948 igfxper32.exe 1948 igfxper32.exe 816 igfxper32.exe 816 igfxper32.exe 2764 igfxper32.exe 2764 igfxper32.exe 2024 igfxper32.exe 2024 igfxper32.exe 2368 igfxper32.exe 2368 igfxper32.exe 1572 igfxper32.exe 1572 igfxper32.exe 2444 igfxper32.exe 2444 igfxper32.exe 2992 igfxper32.exe 2992 igfxper32.exe 2932 igfxper32.exe 2932 igfxper32.exe 2672 igfxper32.exe 2672 igfxper32.exe 2240 igfxper32.exe 2240 igfxper32.exe 2616 igfxper32.exe 2616 igfxper32.exe 1780 igfxper32.exe 1780 igfxper32.exe 1708 igfxper32.exe 1708 igfxper32.exe 1736 igfxper32.exe 1736 igfxper32.exe 1700 igfxper32.exe 1700 igfxper32.exe 1628 igfxper32.exe 1628 igfxper32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum dfae02a237b12f4640a32821ac650d36_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe dfae02a237b12f4640a32821ac650d36_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe dfae02a237b12f4640a32821ac650d36_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe -
resource yara_rule behavioral1/memory/2236-2-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2236-0-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/files/0x0009000000016311-9.dat upx behavioral1/memory/2132-16-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2236-15-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2772-23-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2132-22-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2640-29-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2772-28-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2640-33-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1600-41-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2616-40-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1484-48-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1600-46-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1900-54-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1484-52-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1900-59-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/836-67-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1944-65-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2952-74-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1944-72-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2952-81-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1808-79-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/408-87-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1808-86-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/408-94-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/408-91-0x0000000003300000-0x0000000003391000-memory.dmp upx behavioral1/memory/1376-100-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1268-99-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1376-106-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1948-112-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/816-116-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2024-122-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2764-121-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2024-124-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2368-127-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1572-130-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2444-133-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2992-136-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2932-137-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2932-138-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2672-140-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2616-143-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2240-142-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1780-145-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2616-147-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1780-149-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1708-151-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1736-153-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1700-155-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1628-157-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2004-160-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1288-158-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1288-161-0x00000000033F0000-0x0000000003481000-memory.dmp upx behavioral1/memory/1288-163-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2420-165-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/988-166-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2916-167-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/988-169-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/288-171-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1232-172-0x0000000003360000-0x00000000033F1000-memory.dmp upx behavioral1/memory/1232-174-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/604-177-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/604-175-0x0000000003440000-0x00000000034D1000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 52 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfae02a237b12f4640a32821ac650d36_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 2236 dfae02a237b12f4640a32821ac650d36_JaffaCakes118.exe 2132 igfxper32.exe 2772 igfxper32.exe 2640 igfxper32.exe 2616 igfxper32.exe 1600 igfxper32.exe 1484 igfxper32.exe 1900 igfxper32.exe 836 igfxper32.exe 1944 igfxper32.exe 2952 igfxper32.exe 1808 igfxper32.exe 408 igfxper32.exe 1268 igfxper32.exe 1376 igfxper32.exe 1948 igfxper32.exe 816 igfxper32.exe 2764 igfxper32.exe 2024 igfxper32.exe 2368 igfxper32.exe 1572 igfxper32.exe 2444 igfxper32.exe 2992 igfxper32.exe 2932 igfxper32.exe 2672 igfxper32.exe 2240 igfxper32.exe 2616 igfxper32.exe 1780 igfxper32.exe 1708 igfxper32.exe 1736 igfxper32.exe 1700 igfxper32.exe 1628 igfxper32.exe 2004 igfxper32.exe 1288 igfxper32.exe 2420 igfxper32.exe 2916 igfxper32.exe 988 igfxper32.exe 288 igfxper32.exe 1232 igfxper32.exe 604 igfxper32.exe 816 igfxper32.exe 2352 igfxper32.exe 2364 igfxper32.exe 2144 igfxper32.exe 2360 igfxper32.exe 488 igfxper32.exe 2496 igfxper32.exe 2276 igfxper32.exe 2856 igfxper32.exe 2324 igfxper32.exe 2632 igfxper32.exe 3068 igfxper32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2132 2236 dfae02a237b12f4640a32821ac650d36_JaffaCakes118.exe 31 PID 2236 wrote to memory of 2132 2236 dfae02a237b12f4640a32821ac650d36_JaffaCakes118.exe 31 PID 2236 wrote to memory of 2132 2236 dfae02a237b12f4640a32821ac650d36_JaffaCakes118.exe 31 PID 2236 wrote to memory of 2132 2236 dfae02a237b12f4640a32821ac650d36_JaffaCakes118.exe 31 PID 2132 wrote to memory of 2772 2132 igfxper32.exe 32 PID 2132 wrote to memory of 2772 2132 igfxper32.exe 32 PID 2132 wrote to memory of 2772 2132 igfxper32.exe 32 PID 2132 wrote to memory of 2772 2132 igfxper32.exe 32 PID 2772 wrote to memory of 2640 2772 igfxper32.exe 33 PID 2772 wrote to memory of 2640 2772 igfxper32.exe 33 PID 2772 wrote to memory of 2640 2772 igfxper32.exe 33 PID 2772 wrote to memory of 2640 2772 igfxper32.exe 33 PID 2640 wrote to memory of 2616 2640 igfxper32.exe 34 PID 2640 wrote to memory of 2616 2640 igfxper32.exe 34 PID 2640 wrote to memory of 2616 2640 igfxper32.exe 34 PID 2640 wrote to memory of 2616 2640 igfxper32.exe 34 PID 2616 wrote to memory of 1600 2616 igfxper32.exe 35 PID 2616 wrote to memory of 1600 2616 igfxper32.exe 35 PID 2616 wrote to memory of 1600 2616 igfxper32.exe 35 PID 2616 wrote to memory of 1600 2616 igfxper32.exe 35 PID 1600 wrote to memory of 1484 1600 igfxper32.exe 36 PID 1600 wrote to memory of 1484 1600 igfxper32.exe 36 PID 1600 wrote to memory of 1484 1600 igfxper32.exe 36 PID 1600 wrote to memory of 1484 1600 igfxper32.exe 36 PID 1484 wrote to memory of 1900 1484 igfxper32.exe 37 PID 1484 wrote to memory of 1900 1484 igfxper32.exe 37 PID 1484 wrote to memory of 1900 1484 igfxper32.exe 37 PID 1484 wrote to memory of 1900 1484 igfxper32.exe 37 PID 1900 wrote to memory of 836 1900 igfxper32.exe 38 PID 1900 wrote to memory of 836 1900 igfxper32.exe 38 PID 1900 wrote to memory of 836 1900 igfxper32.exe 38 PID 1900 wrote to memory of 836 1900 igfxper32.exe 38 PID 836 wrote to memory of 1944 836 igfxper32.exe 39 PID 836 wrote to memory of 1944 836 igfxper32.exe 39 PID 836 wrote to memory of 1944 836 igfxper32.exe 39 PID 836 wrote to memory of 1944 836 igfxper32.exe 39 PID 1944 wrote to memory of 2952 1944 igfxper32.exe 40 PID 1944 wrote to memory of 2952 1944 igfxper32.exe 40 PID 1944 wrote to memory of 2952 1944 igfxper32.exe 40 PID 1944 wrote to memory of 2952 1944 igfxper32.exe 40 PID 2952 wrote to memory of 1808 2952 igfxper32.exe 41 PID 2952 wrote to memory of 1808 2952 igfxper32.exe 41 PID 2952 wrote to memory of 1808 2952 igfxper32.exe 41 PID 2952 wrote to memory of 1808 2952 igfxper32.exe 41 PID 1808 wrote to memory of 408 1808 igfxper32.exe 42 PID 1808 wrote to memory of 408 1808 igfxper32.exe 42 PID 1808 wrote to memory of 408 1808 igfxper32.exe 42 PID 1808 wrote to memory of 408 1808 igfxper32.exe 42 PID 408 wrote to memory of 1268 408 igfxper32.exe 43 PID 408 wrote to memory of 1268 408 igfxper32.exe 43 PID 408 wrote to memory of 1268 408 igfxper32.exe 43 PID 408 wrote to memory of 1268 408 igfxper32.exe 43 PID 1268 wrote to memory of 1376 1268 igfxper32.exe 44 PID 1268 wrote to memory of 1376 1268 igfxper32.exe 44 PID 1268 wrote to memory of 1376 1268 igfxper32.exe 44 PID 1268 wrote to memory of 1376 1268 igfxper32.exe 44 PID 1376 wrote to memory of 1948 1376 igfxper32.exe 45 PID 1376 wrote to memory of 1948 1376 igfxper32.exe 45 PID 1376 wrote to memory of 1948 1376 igfxper32.exe 45 PID 1376 wrote to memory of 1948 1376 igfxper32.exe 45 PID 1948 wrote to memory of 816 1948 igfxper32.exe 46 PID 1948 wrote to memory of 816 1948 igfxper32.exe 46 PID 1948 wrote to memory of 816 1948 igfxper32.exe 46 PID 1948 wrote to memory of 816 1948 igfxper32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfae02a237b12f4640a32821ac650d36_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dfae02a237b12f4640a32821ac650d36_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Users\Admin\AppData\Local\Temp\DFAE02~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:816 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2764 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2024 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2368 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1572 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2444 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2992 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2932 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2672 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2240 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2616 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1780 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1708 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1736 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1700 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1628 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2004 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1288 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE35⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2420 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2916 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:988 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:288 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1232 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:604 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:816 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2352 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2364 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2144 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2360 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:488 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2496 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2276 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE49⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2856 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE50⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2324 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE51⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2632 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE52⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3068
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
227KB
MD5dfae02a237b12f4640a32821ac650d36
SHA1bb7407abd22acb3f530c84b4a9314f773b2987c0
SHA2562e14d7a10912db1ddee63cb10e86d2d291465256ab1f826b12d398af9306fe3a
SHA512e1f943357a0c4d6c82f59d5eeb6503742b8eb8727e4a50333901665b249daac523d235dc1940d1f70fa0dc957f46114ba2c96979fe8288d99e47d75026d465c7