Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 09:51
Static task
static1
Behavioral task
behavioral1
Sample
eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe
-
Size
204KB
-
MD5
eaeef1c73abc9b57cf0b2d88472e1412
-
SHA1
d6775d7a09c291882a1f343642e5c4463513401d
-
SHA256
f500579ea2f18c90b2fe8317d85e91593b1ecfe66427f7dedd93dc0bc1896523
-
SHA512
ff7b03df24cfb0cf52204cc5a50af10fad37a40e9b0563872b8293740f3a3c7c6ec841b108bbf8050da0c7a79563d42a3d8423902cea8c277cae47d80fce0159
-
SSDEEP
3072:aOucr4iXDvSj9i1vnkIqjN+x+y1ofDPQZiJGzSPcFYFAHB0Dd4kO:zrurNOaYeySPc7BS4
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 1996 igfxdwx32.exe -
Executes dropped EXE 49 IoCs
pid Process 1996 igfxdwx32.exe 2648 igfxdwx32.exe 636 igfxdwx32.exe 1520 igfxdwx32.exe 396 igfxdwx32.exe 652 igfxdwx32.exe 3008 igfxdwx32.exe 1644 igfxdwx32.exe 2424 igfxdwx32.exe 2940 igfxdwx32.exe 2344 igfxdwx32.exe 2816 igfxdwx32.exe 2088 igfxdwx32.exe 2288 igfxdwx32.exe 1528 igfxdwx32.exe 2960 igfxdwx32.exe 2188 igfxdwx32.exe 1792 igfxdwx32.exe 1680 igfxdwx32.exe 2768 igfxdwx32.exe 1360 igfxdwx32.exe 1776 igfxdwx32.exe 2544 igfxdwx32.exe 2656 igfxdwx32.exe 1976 igfxdwx32.exe 2856 igfxdwx32.exe 2840 igfxdwx32.exe 676 igfxdwx32.exe 2472 igfxdwx32.exe 688 igfxdwx32.exe 1684 igfxdwx32.exe 2352 igfxdwx32.exe 2424 igfxdwx32.exe 2444 igfxdwx32.exe 2044 igfxdwx32.exe 1996 igfxdwx32.exe 2996 igfxdwx32.exe 1640 igfxdwx32.exe 1816 igfxdwx32.exe 2624 igfxdwx32.exe 1944 igfxdwx32.exe 1096 igfxdwx32.exe 1964 igfxdwx32.exe 2280 igfxdwx32.exe 1256 igfxdwx32.exe 320 igfxdwx32.exe 1972 igfxdwx32.exe 1920 igfxdwx32.exe 2544 igfxdwx32.exe -
Loads dropped DLL 64 IoCs
pid Process 2512 eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe 2512 eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe 1996 igfxdwx32.exe 1996 igfxdwx32.exe 2648 igfxdwx32.exe 2648 igfxdwx32.exe 636 igfxdwx32.exe 636 igfxdwx32.exe 1520 igfxdwx32.exe 1520 igfxdwx32.exe 396 igfxdwx32.exe 396 igfxdwx32.exe 652 igfxdwx32.exe 652 igfxdwx32.exe 3008 igfxdwx32.exe 3008 igfxdwx32.exe 1644 igfxdwx32.exe 1644 igfxdwx32.exe 2424 igfxdwx32.exe 2424 igfxdwx32.exe 2940 igfxdwx32.exe 2940 igfxdwx32.exe 2344 igfxdwx32.exe 2344 igfxdwx32.exe 2816 igfxdwx32.exe 2816 igfxdwx32.exe 2088 igfxdwx32.exe 2088 igfxdwx32.exe 2288 igfxdwx32.exe 2288 igfxdwx32.exe 1528 igfxdwx32.exe 1528 igfxdwx32.exe 2960 igfxdwx32.exe 2960 igfxdwx32.exe 2188 igfxdwx32.exe 2188 igfxdwx32.exe 1792 igfxdwx32.exe 1792 igfxdwx32.exe 1680 igfxdwx32.exe 1680 igfxdwx32.exe 2768 igfxdwx32.exe 2768 igfxdwx32.exe 1360 igfxdwx32.exe 1360 igfxdwx32.exe 1776 igfxdwx32.exe 1776 igfxdwx32.exe 2544 igfxdwx32.exe 2544 igfxdwx32.exe 2656 igfxdwx32.exe 2656 igfxdwx32.exe 1976 igfxdwx32.exe 1976 igfxdwx32.exe 2856 igfxdwx32.exe 2856 igfxdwx32.exe 2840 igfxdwx32.exe 2840 igfxdwx32.exe 676 igfxdwx32.exe 676 igfxdwx32.exe 2472 igfxdwx32.exe 2472 igfxdwx32.exe 688 igfxdwx32.exe 688 igfxdwx32.exe 1684 igfxdwx32.exe 1684 igfxdwx32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdwx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdwx32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File created C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdwx32.exe File created C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File created C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File created C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdwx32.exe File created C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File created C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File created C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File created C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File created C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File created C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdwx32.exe File created C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File created C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\ eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File created C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdwx32.exe File created C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File created C:\Windows\SysWOW64\igfxdwx32.exe eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File created C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File created C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File created C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File created C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File created C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File created C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File created C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File created C:\Windows\SysWOW64\igfxdwx32.exe igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdwx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdwx32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 49 IoCs
pid Process 2512 eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe 1996 igfxdwx32.exe 2648 igfxdwx32.exe 636 igfxdwx32.exe 1520 igfxdwx32.exe 396 igfxdwx32.exe 652 igfxdwx32.exe 3008 igfxdwx32.exe 1644 igfxdwx32.exe 2424 igfxdwx32.exe 2940 igfxdwx32.exe 2816 igfxdwx32.exe 2088 igfxdwx32.exe 2288 igfxdwx32.exe 1528 igfxdwx32.exe 2960 igfxdwx32.exe 2188 igfxdwx32.exe 1792 igfxdwx32.exe 1680 igfxdwx32.exe 2768 igfxdwx32.exe 1360 igfxdwx32.exe 1776 igfxdwx32.exe 2544 igfxdwx32.exe 2656 igfxdwx32.exe 1976 igfxdwx32.exe 2856 igfxdwx32.exe 2840 igfxdwx32.exe 676 igfxdwx32.exe 2472 igfxdwx32.exe 688 igfxdwx32.exe 1684 igfxdwx32.exe 2352 igfxdwx32.exe 2424 igfxdwx32.exe 2444 igfxdwx32.exe 2044 igfxdwx32.exe 1996 igfxdwx32.exe 2996 igfxdwx32.exe 1640 igfxdwx32.exe 1816 igfxdwx32.exe 2624 igfxdwx32.exe 1944 igfxdwx32.exe 1096 igfxdwx32.exe 1964 igfxdwx32.exe 2280 igfxdwx32.exe 1256 igfxdwx32.exe 320 igfxdwx32.exe 1972 igfxdwx32.exe 1920 igfxdwx32.exe 2544 igfxdwx32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 49 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdwx32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2512 eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe 2512 eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe 2512 eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe 2512 eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe 2512 eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe 2512 eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe 2512 eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe 2512 eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe 2512 eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe 2512 eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe 2512 eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe 2512 eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe 2512 eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe 2512 eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe 2512 eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe 2512 eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe 1996 igfxdwx32.exe 1996 igfxdwx32.exe 1996 igfxdwx32.exe 1996 igfxdwx32.exe 1996 igfxdwx32.exe 1996 igfxdwx32.exe 1996 igfxdwx32.exe 1996 igfxdwx32.exe 1996 igfxdwx32.exe 1996 igfxdwx32.exe 1996 igfxdwx32.exe 1996 igfxdwx32.exe 1996 igfxdwx32.exe 1996 igfxdwx32.exe 1996 igfxdwx32.exe 1996 igfxdwx32.exe 2648 igfxdwx32.exe 2648 igfxdwx32.exe 2648 igfxdwx32.exe 2648 igfxdwx32.exe 2648 igfxdwx32.exe 2648 igfxdwx32.exe 2648 igfxdwx32.exe 2648 igfxdwx32.exe 2648 igfxdwx32.exe 2648 igfxdwx32.exe 2648 igfxdwx32.exe 2648 igfxdwx32.exe 2648 igfxdwx32.exe 2648 igfxdwx32.exe 2648 igfxdwx32.exe 2648 igfxdwx32.exe 636 igfxdwx32.exe 636 igfxdwx32.exe 636 igfxdwx32.exe 636 igfxdwx32.exe 636 igfxdwx32.exe 636 igfxdwx32.exe 636 igfxdwx32.exe 636 igfxdwx32.exe 636 igfxdwx32.exe 636 igfxdwx32.exe 636 igfxdwx32.exe 636 igfxdwx32.exe 636 igfxdwx32.exe 636 igfxdwx32.exe 636 igfxdwx32.exe 636 igfxdwx32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2512 wrote to memory of 1996 2512 eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe 31 PID 2512 wrote to memory of 1996 2512 eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe 31 PID 2512 wrote to memory of 1996 2512 eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe 31 PID 2512 wrote to memory of 1996 2512 eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe 31 PID 1996 wrote to memory of 2648 1996 igfxdwx32.exe 32 PID 1996 wrote to memory of 2648 1996 igfxdwx32.exe 32 PID 1996 wrote to memory of 2648 1996 igfxdwx32.exe 32 PID 1996 wrote to memory of 2648 1996 igfxdwx32.exe 32 PID 2648 wrote to memory of 636 2648 igfxdwx32.exe 33 PID 2648 wrote to memory of 636 2648 igfxdwx32.exe 33 PID 2648 wrote to memory of 636 2648 igfxdwx32.exe 33 PID 2648 wrote to memory of 636 2648 igfxdwx32.exe 33 PID 636 wrote to memory of 1520 636 igfxdwx32.exe 34 PID 636 wrote to memory of 1520 636 igfxdwx32.exe 34 PID 636 wrote to memory of 1520 636 igfxdwx32.exe 34 PID 636 wrote to memory of 1520 636 igfxdwx32.exe 34 PID 1520 wrote to memory of 396 1520 igfxdwx32.exe 35 PID 1520 wrote to memory of 396 1520 igfxdwx32.exe 35 PID 1520 wrote to memory of 396 1520 igfxdwx32.exe 35 PID 1520 wrote to memory of 396 1520 igfxdwx32.exe 35 PID 396 wrote to memory of 652 396 igfxdwx32.exe 36 PID 396 wrote to memory of 652 396 igfxdwx32.exe 36 PID 396 wrote to memory of 652 396 igfxdwx32.exe 36 PID 396 wrote to memory of 652 396 igfxdwx32.exe 36 PID 652 wrote to memory of 3008 652 igfxdwx32.exe 37 PID 652 wrote to memory of 3008 652 igfxdwx32.exe 37 PID 652 wrote to memory of 3008 652 igfxdwx32.exe 37 PID 652 wrote to memory of 3008 652 igfxdwx32.exe 37 PID 3008 wrote to memory of 1644 3008 igfxdwx32.exe 38 PID 3008 wrote to memory of 1644 3008 igfxdwx32.exe 38 PID 3008 wrote to memory of 1644 3008 igfxdwx32.exe 38 PID 3008 wrote to memory of 1644 3008 igfxdwx32.exe 38 PID 1644 wrote to memory of 2424 1644 igfxdwx32.exe 39 PID 1644 wrote to memory of 2424 1644 igfxdwx32.exe 39 PID 1644 wrote to memory of 2424 1644 igfxdwx32.exe 39 PID 1644 wrote to memory of 2424 1644 igfxdwx32.exe 39 PID 2424 wrote to memory of 2940 2424 igfxdwx32.exe 40 PID 2424 wrote to memory of 2940 2424 igfxdwx32.exe 40 PID 2424 wrote to memory of 2940 2424 igfxdwx32.exe 40 PID 2424 wrote to memory of 2940 2424 igfxdwx32.exe 40 PID 2940 wrote to memory of 2344 2940 igfxdwx32.exe 41 PID 2940 wrote to memory of 2344 2940 igfxdwx32.exe 41 PID 2940 wrote to memory of 2344 2940 igfxdwx32.exe 41 PID 2940 wrote to memory of 2344 2940 igfxdwx32.exe 41 PID 2816 wrote to memory of 2088 2816 igfxdwx32.exe 43 PID 2816 wrote to memory of 2088 2816 igfxdwx32.exe 43 PID 2816 wrote to memory of 2088 2816 igfxdwx32.exe 43 PID 2816 wrote to memory of 2088 2816 igfxdwx32.exe 43 PID 2088 wrote to memory of 2288 2088 igfxdwx32.exe 44 PID 2088 wrote to memory of 2288 2088 igfxdwx32.exe 44 PID 2088 wrote to memory of 2288 2088 igfxdwx32.exe 44 PID 2088 wrote to memory of 2288 2088 igfxdwx32.exe 44 PID 2288 wrote to memory of 1528 2288 igfxdwx32.exe 45 PID 2288 wrote to memory of 1528 2288 igfxdwx32.exe 45 PID 2288 wrote to memory of 1528 2288 igfxdwx32.exe 45 PID 2288 wrote to memory of 1528 2288 igfxdwx32.exe 45 PID 1528 wrote to memory of 2960 1528 igfxdwx32.exe 46 PID 1528 wrote to memory of 2960 1528 igfxdwx32.exe 46 PID 1528 wrote to memory of 2960 1528 igfxdwx32.exe 46 PID 1528 wrote to memory of 2960 1528 igfxdwx32.exe 46 PID 2960 wrote to memory of 2188 2960 igfxdwx32.exe 47 PID 2960 wrote to memory of 2188 2960 igfxdwx32.exe 47 PID 2960 wrote to memory of 2188 2960 igfxdwx32.exe 47 PID 2960 wrote to memory of 2188 2960 igfxdwx32.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eaeef1c73abc9b57cf0b2d88472e1412_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Users\Admin\AppData\Local\Temp\EAEEF1~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2344 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2188 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1792 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1680 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2768 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1360 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1776 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2544 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2656 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1976 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2856 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2840 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:676 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2472 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:688 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1684 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2352 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE34⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2424 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2444 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2044 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1996 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2996 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1640 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1816 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2624 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE42⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1944 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1096 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1964 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2280 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1256 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:320 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1972 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE49⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1920 -
C:\Windows\SysWOW64\igfxdwx32.exe"C:\Windows\system32\igfxdwx32.exe" C:\Windows\SysWOW64\IGFXDW~1.EXE50⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2544
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5eaeef1c73abc9b57cf0b2d88472e1412
SHA1d6775d7a09c291882a1f343642e5c4463513401d
SHA256f500579ea2f18c90b2fe8317d85e91593b1ecfe66427f7dedd93dc0bc1896523
SHA512ff7b03df24cfb0cf52204cc5a50af10fad37a40e9b0563872b8293740f3a3c7c6ec841b108bbf8050da0c7a79563d42a3d8423902cea8c277cae47d80fce0159