Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 19:59
Static task
static1
Behavioral task
behavioral1
Sample
e2fdff574a795d5663d615e921b81f7c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2fdff574a795d5663d615e921b81f7c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e2fdff574a795d5663d615e921b81f7c_JaffaCakes118.exe
-
Size
199KB
-
MD5
e2fdff574a795d5663d615e921b81f7c
-
SHA1
e6c35947635a77ffe3b5140c2a4c4eb72de6919d
-
SHA256
562effd04841e97a20f227a90cbe032e31ebc5752395c6fc68539c92c0140622
-
SHA512
98d6b5bc88dde3f849a9705e19f1045b4ac3912608dd2793f3e114dc7cc62e605e74c21865913d18cb53431ad3d81103e226be23339abaa8da55462b2a149c2f
-
SSDEEP
6144:Ozii12HtAmr+ERwrA2AOymENlsiONXQi:O/+xSAnvNlsiON
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 1440 igfxmgv32.exe -
Executes dropped EXE 48 IoCs
pid Process 1440 igfxmgv32.exe 588 igfxmgv32.exe 2488 igfxmgv32.exe 1180 igfxmgv32.exe 1016 igfxmgv32.exe 2920 igfxmgv32.exe 112 igfxmgv32.exe 1536 igfxmgv32.exe 284 igfxmgv32.exe 2248 igfxmgv32.exe 1788 igfxmgv32.exe 2580 igfxmgv32.exe 2864 igfxmgv32.exe 588 igfxmgv32.exe 2812 igfxmgv32.exe 824 igfxmgv32.exe 2912 igfxmgv32.exe 1348 igfxmgv32.exe 2940 igfxmgv32.exe 3056 igfxmgv32.exe 2484 igfxmgv32.exe 1560 igfxmgv32.exe 3004 igfxmgv32.exe 2808 igfxmgv32.exe 3032 igfxmgv32.exe 780 igfxmgv32.exe 664 igfxmgv32.exe 2928 igfxmgv32.exe 1932 igfxmgv32.exe 1056 igfxmgv32.exe 1540 igfxmgv32.exe 1772 igfxmgv32.exe 2628 igfxmgv32.exe 2684 igfxmgv32.exe 2668 igfxmgv32.exe 2564 igfxmgv32.exe 2532 igfxmgv32.exe 296 igfxmgv32.exe 2572 igfxmgv32.exe 2824 igfxmgv32.exe 848 igfxmgv32.exe 2912 igfxmgv32.exe 1628 igfxmgv32.exe 916 igfxmgv32.exe 2320 igfxmgv32.exe 2940 igfxmgv32.exe 2628 igfxmgv32.exe 2652 igfxmgv32.exe -
Loads dropped DLL 64 IoCs
pid Process 2808 e2fdff574a795d5663d615e921b81f7c_JaffaCakes118.exe 2808 e2fdff574a795d5663d615e921b81f7c_JaffaCakes118.exe 1440 igfxmgv32.exe 1440 igfxmgv32.exe 588 igfxmgv32.exe 588 igfxmgv32.exe 2488 igfxmgv32.exe 2488 igfxmgv32.exe 1180 igfxmgv32.exe 1180 igfxmgv32.exe 1016 igfxmgv32.exe 1016 igfxmgv32.exe 2920 igfxmgv32.exe 2920 igfxmgv32.exe 112 igfxmgv32.exe 112 igfxmgv32.exe 1536 igfxmgv32.exe 1536 igfxmgv32.exe 284 igfxmgv32.exe 284 igfxmgv32.exe 2248 igfxmgv32.exe 2248 igfxmgv32.exe 1788 igfxmgv32.exe 1788 igfxmgv32.exe 2580 igfxmgv32.exe 2580 igfxmgv32.exe 2864 igfxmgv32.exe 2864 igfxmgv32.exe 588 igfxmgv32.exe 588 igfxmgv32.exe 2812 igfxmgv32.exe 2812 igfxmgv32.exe 824 igfxmgv32.exe 824 igfxmgv32.exe 2912 igfxmgv32.exe 2912 igfxmgv32.exe 1348 igfxmgv32.exe 1348 igfxmgv32.exe 2940 igfxmgv32.exe 2940 igfxmgv32.exe 3056 igfxmgv32.exe 3056 igfxmgv32.exe 2484 igfxmgv32.exe 2484 igfxmgv32.exe 1560 igfxmgv32.exe 1560 igfxmgv32.exe 3004 igfxmgv32.exe 3004 igfxmgv32.exe 2808 igfxmgv32.exe 2808 igfxmgv32.exe 3032 igfxmgv32.exe 3032 igfxmgv32.exe 780 igfxmgv32.exe 780 igfxmgv32.exe 664 igfxmgv32.exe 664 igfxmgv32.exe 2928 igfxmgv32.exe 2928 igfxmgv32.exe 1932 igfxmgv32.exe 1932 igfxmgv32.exe 1056 igfxmgv32.exe 1056 igfxmgv32.exe 1540 igfxmgv32.exe 1540 igfxmgv32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum e2fdff574a795d5663d615e921b81f7c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxmgv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxmgv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxmgv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxmgv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxmgv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxmgv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxmgv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmgv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxmgv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxmgv32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\ igfxmgv32.exe File created C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File created C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\ igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File created C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\ igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\ igfxmgv32.exe File created C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File created C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\ igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\ igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\ igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\ igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\ igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\ igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\ igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\ igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File created C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File created C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\ igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\ igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\ igfxmgv32.exe File created C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File created C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\ igfxmgv32.exe File created C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\ igfxmgv32.exe File created C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File created C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\ igfxmgv32.exe File created C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\ igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\ igfxmgv32.exe File created C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\ igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\ igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\ igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File created C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File created C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File created C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\ igfxmgv32.exe File opened for modification C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File created C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe File created C:\Windows\SysWOW64\igfxmgv32.exe igfxmgv32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 49 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdff574a795d5663d615e921b81f7c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmgv32.exe -
Suspicious behavior: EnumeratesProcesses 49 IoCs
pid Process 2808 e2fdff574a795d5663d615e921b81f7c_JaffaCakes118.exe 1440 igfxmgv32.exe 588 igfxmgv32.exe 2488 igfxmgv32.exe 1180 igfxmgv32.exe 1016 igfxmgv32.exe 2920 igfxmgv32.exe 112 igfxmgv32.exe 1536 igfxmgv32.exe 284 igfxmgv32.exe 2248 igfxmgv32.exe 1788 igfxmgv32.exe 2580 igfxmgv32.exe 2864 igfxmgv32.exe 588 igfxmgv32.exe 2812 igfxmgv32.exe 824 igfxmgv32.exe 2912 igfxmgv32.exe 1348 igfxmgv32.exe 2940 igfxmgv32.exe 3056 igfxmgv32.exe 2484 igfxmgv32.exe 1560 igfxmgv32.exe 3004 igfxmgv32.exe 2808 igfxmgv32.exe 3032 igfxmgv32.exe 780 igfxmgv32.exe 664 igfxmgv32.exe 2928 igfxmgv32.exe 1932 igfxmgv32.exe 1056 igfxmgv32.exe 1540 igfxmgv32.exe 1772 igfxmgv32.exe 2628 igfxmgv32.exe 2684 igfxmgv32.exe 2668 igfxmgv32.exe 2564 igfxmgv32.exe 2532 igfxmgv32.exe 296 igfxmgv32.exe 2572 igfxmgv32.exe 2824 igfxmgv32.exe 848 igfxmgv32.exe 2912 igfxmgv32.exe 1628 igfxmgv32.exe 916 igfxmgv32.exe 2320 igfxmgv32.exe 2940 igfxmgv32.exe 2628 igfxmgv32.exe 2652 igfxmgv32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2808 wrote to memory of 1440 2808 e2fdff574a795d5663d615e921b81f7c_JaffaCakes118.exe 31 PID 2808 wrote to memory of 1440 2808 e2fdff574a795d5663d615e921b81f7c_JaffaCakes118.exe 31 PID 2808 wrote to memory of 1440 2808 e2fdff574a795d5663d615e921b81f7c_JaffaCakes118.exe 31 PID 2808 wrote to memory of 1440 2808 e2fdff574a795d5663d615e921b81f7c_JaffaCakes118.exe 31 PID 1440 wrote to memory of 588 1440 igfxmgv32.exe 32 PID 1440 wrote to memory of 588 1440 igfxmgv32.exe 32 PID 1440 wrote to memory of 588 1440 igfxmgv32.exe 32 PID 1440 wrote to memory of 588 1440 igfxmgv32.exe 32 PID 588 wrote to memory of 2488 588 igfxmgv32.exe 33 PID 588 wrote to memory of 2488 588 igfxmgv32.exe 33 PID 588 wrote to memory of 2488 588 igfxmgv32.exe 33 PID 588 wrote to memory of 2488 588 igfxmgv32.exe 33 PID 2488 wrote to memory of 1180 2488 igfxmgv32.exe 34 PID 2488 wrote to memory of 1180 2488 igfxmgv32.exe 34 PID 2488 wrote to memory of 1180 2488 igfxmgv32.exe 34 PID 2488 wrote to memory of 1180 2488 igfxmgv32.exe 34 PID 1180 wrote to memory of 1016 1180 igfxmgv32.exe 35 PID 1180 wrote to memory of 1016 1180 igfxmgv32.exe 35 PID 1180 wrote to memory of 1016 1180 igfxmgv32.exe 35 PID 1180 wrote to memory of 1016 1180 igfxmgv32.exe 35 PID 1016 wrote to memory of 2920 1016 igfxmgv32.exe 36 PID 1016 wrote to memory of 2920 1016 igfxmgv32.exe 36 PID 1016 wrote to memory of 2920 1016 igfxmgv32.exe 36 PID 1016 wrote to memory of 2920 1016 igfxmgv32.exe 36 PID 2920 wrote to memory of 112 2920 igfxmgv32.exe 37 PID 2920 wrote to memory of 112 2920 igfxmgv32.exe 37 PID 2920 wrote to memory of 112 2920 igfxmgv32.exe 37 PID 2920 wrote to memory of 112 2920 igfxmgv32.exe 37 PID 112 wrote to memory of 1536 112 igfxmgv32.exe 38 PID 112 wrote to memory of 1536 112 igfxmgv32.exe 38 PID 112 wrote to memory of 1536 112 igfxmgv32.exe 38 PID 112 wrote to memory of 1536 112 igfxmgv32.exe 38 PID 1536 wrote to memory of 284 1536 igfxmgv32.exe 39 PID 1536 wrote to memory of 284 1536 igfxmgv32.exe 39 PID 1536 wrote to memory of 284 1536 igfxmgv32.exe 39 PID 1536 wrote to memory of 284 1536 igfxmgv32.exe 39 PID 284 wrote to memory of 2248 284 igfxmgv32.exe 40 PID 284 wrote to memory of 2248 284 igfxmgv32.exe 40 PID 284 wrote to memory of 2248 284 igfxmgv32.exe 40 PID 284 wrote to memory of 2248 284 igfxmgv32.exe 40 PID 2248 wrote to memory of 1788 2248 igfxmgv32.exe 41 PID 2248 wrote to memory of 1788 2248 igfxmgv32.exe 41 PID 2248 wrote to memory of 1788 2248 igfxmgv32.exe 41 PID 2248 wrote to memory of 1788 2248 igfxmgv32.exe 41 PID 1788 wrote to memory of 2580 1788 igfxmgv32.exe 42 PID 1788 wrote to memory of 2580 1788 igfxmgv32.exe 42 PID 1788 wrote to memory of 2580 1788 igfxmgv32.exe 42 PID 1788 wrote to memory of 2580 1788 igfxmgv32.exe 42 PID 2580 wrote to memory of 2864 2580 igfxmgv32.exe 43 PID 2580 wrote to memory of 2864 2580 igfxmgv32.exe 43 PID 2580 wrote to memory of 2864 2580 igfxmgv32.exe 43 PID 2580 wrote to memory of 2864 2580 igfxmgv32.exe 43 PID 2864 wrote to memory of 588 2864 igfxmgv32.exe 44 PID 2864 wrote to memory of 588 2864 igfxmgv32.exe 44 PID 2864 wrote to memory of 588 2864 igfxmgv32.exe 44 PID 2864 wrote to memory of 588 2864 igfxmgv32.exe 44 PID 588 wrote to memory of 2812 588 igfxmgv32.exe 45 PID 588 wrote to memory of 2812 588 igfxmgv32.exe 45 PID 588 wrote to memory of 2812 588 igfxmgv32.exe 45 PID 588 wrote to memory of 2812 588 igfxmgv32.exe 45 PID 2812 wrote to memory of 824 2812 igfxmgv32.exe 46 PID 2812 wrote to memory of 824 2812 igfxmgv32.exe 46 PID 2812 wrote to memory of 824 2812 igfxmgv32.exe 46 PID 2812 wrote to memory of 824 2812 igfxmgv32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2fdff574a795d5663d615e921b81f7c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e2fdff574a795d5663d615e921b81f7c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Users\Admin\AppData\Local\Temp\E2FDFF~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:284 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:824 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2912 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1348 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2940 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3056 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2484 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1560 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3004 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2808 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3032 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:780 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:664 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2928 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1932 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1056 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1540 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1772 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2628 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2684 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2668 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2564 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2532 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:296 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2572 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2824 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:848 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2912 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1628 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:916 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2320 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2940 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2628 -
C:\Windows\SysWOW64\igfxmgv32.exe"C:\Windows\system32\igfxmgv32.exe" C:\Windows\SysWOW64\IGFXMG~1.EXE49⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2652
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
199KB
MD5e2fdff574a795d5663d615e921b81f7c
SHA1e6c35947635a77ffe3b5140c2a4c4eb72de6919d
SHA256562effd04841e97a20f227a90cbe032e31ebc5752395c6fc68539c92c0140622
SHA51298d6b5bc88dde3f849a9705e19f1045b4ac3912608dd2793f3e114dc7cc62e605e74c21865913d18cb53431ad3d81103e226be23339abaa8da55462b2a149c2f