Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 13:39
Behavioral task
behavioral1
Sample
ebc3cef94419ec4e63728fa50198a543_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
ebc3cef94419ec4e63728fa50198a543_JaffaCakes118.exe
-
Size
212KB
-
MD5
ebc3cef94419ec4e63728fa50198a543
-
SHA1
26565e91c1a93a49811bfdd8fa467a030260e834
-
SHA256
56a40d09a61719b5b6f104dba4cdfd156387531d980c56726929f5b5973cbdae
-
SHA512
74455e1bfceb93beb3b51ba6f020c5c88af290f2f7c80dcf2c460cb2a52b7589823096e01a9310fe89b8783c0473ad8f33d8b3e55a10b8584fb6ff98a70eb563
-
SSDEEP
6144:as3laSOajYEuFUJ3nyeGg3zAeRT2BD62GWyp3GBMG3R3qOjr:r1aShYzFUJ3Wg3/RTTVTd1Yfr
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 1712 igfxdc32.exe -
Executes dropped EXE 47 IoCs
pid Process 1712 igfxdc32.exe 2796 igfxdc32.exe 2272 igfxdc32.exe 2744 igfxdc32.exe 2664 igfxdc32.exe 1096 igfxdc32.exe 1508 igfxdc32.exe 876 igfxdc32.exe 1028 igfxdc32.exe 2928 igfxdc32.exe 1816 igfxdc32.exe 1144 igfxdc32.exe 712 igfxdc32.exe 928 igfxdc32.exe 1544 igfxdc32.exe 3004 igfxdc32.exe 820 igfxdc32.exe 896 igfxdc32.exe 2352 igfxdc32.exe 2128 igfxdc32.exe 1712 igfxdc32.exe 1304 igfxdc32.exe 2660 igfxdc32.exe 2936 igfxdc32.exe 2564 igfxdc32.exe 3056 igfxdc32.exe 1684 igfxdc32.exe 2876 igfxdc32.exe 2612 igfxdc32.exe 2880 igfxdc32.exe 1644 igfxdc32.exe 2940 igfxdc32.exe 2392 igfxdc32.exe 1812 igfxdc32.exe 1044 igfxdc32.exe 1872 igfxdc32.exe 2052 igfxdc32.exe 1560 igfxdc32.exe 1784 igfxdc32.exe 900 igfxdc32.exe 624 igfxdc32.exe 1512 igfxdc32.exe 496 igfxdc32.exe 1788 igfxdc32.exe 2780 igfxdc32.exe 768 igfxdc32.exe 2648 igfxdc32.exe -
Loads dropped DLL 64 IoCs
pid Process 784 ebc3cef94419ec4e63728fa50198a543_JaffaCakes118.exe 784 ebc3cef94419ec4e63728fa50198a543_JaffaCakes118.exe 1712 igfxdc32.exe 1712 igfxdc32.exe 2796 igfxdc32.exe 2796 igfxdc32.exe 2272 igfxdc32.exe 2272 igfxdc32.exe 2744 igfxdc32.exe 2744 igfxdc32.exe 2664 igfxdc32.exe 2664 igfxdc32.exe 1096 igfxdc32.exe 1096 igfxdc32.exe 1508 igfxdc32.exe 1508 igfxdc32.exe 876 igfxdc32.exe 876 igfxdc32.exe 1028 igfxdc32.exe 1028 igfxdc32.exe 2928 igfxdc32.exe 2928 igfxdc32.exe 1816 igfxdc32.exe 1816 igfxdc32.exe 1144 igfxdc32.exe 1144 igfxdc32.exe 712 igfxdc32.exe 712 igfxdc32.exe 928 igfxdc32.exe 928 igfxdc32.exe 1544 igfxdc32.exe 1544 igfxdc32.exe 3004 igfxdc32.exe 3004 igfxdc32.exe 820 igfxdc32.exe 820 igfxdc32.exe 896 igfxdc32.exe 896 igfxdc32.exe 2352 igfxdc32.exe 2352 igfxdc32.exe 2128 igfxdc32.exe 2128 igfxdc32.exe 1712 igfxdc32.exe 1712 igfxdc32.exe 1304 igfxdc32.exe 1304 igfxdc32.exe 2660 igfxdc32.exe 2660 igfxdc32.exe 2936 igfxdc32.exe 2936 igfxdc32.exe 2564 igfxdc32.exe 2564 igfxdc32.exe 3056 igfxdc32.exe 3056 igfxdc32.exe 1684 igfxdc32.exe 1684 igfxdc32.exe 2876 igfxdc32.exe 2876 igfxdc32.exe 2612 igfxdc32.exe 2612 igfxdc32.exe 2880 igfxdc32.exe 2880 igfxdc32.exe 1644 igfxdc32.exe 1644 igfxdc32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 ebc3cef94419ec4e63728fa50198a543_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ebc3cef94419ec4e63728fa50198a543_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdc32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File opened for modification C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdc32.exe File opened for modification C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File opened for modification C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdc32.exe File opened for modification C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File opened for modification C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdc32.exe File opened for modification C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File created C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File opened for modification C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File opened for modification C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File created C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File opened for modification C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdc32.exe File opened for modification C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File created C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File created C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdc32.exe File created C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File created C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File created C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File created C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File opened for modification C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdc32.exe File created C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File opened for modification C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File opened for modification C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File created C:\Windows\SysWOW64\igfxdc32.exe ebc3cef94419ec4e63728fa50198a543_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File created C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File created C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File opened for modification C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File created C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File opened for modification C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File created C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdc32.exe File opened for modification C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdc32.exe File created C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File opened for modification C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File opened for modification C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File created C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File created C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdc32.exe File opened for modification C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdc32.exe File created C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File opened for modification C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdc32.exe File created C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdc32.exe File opened for modification C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File opened for modification C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File opened for modification C:\Windows\SysWOW64\igfxdc32.exe igfxdc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdc32.exe -
resource yara_rule behavioral1/memory/784-0-0x0000000013110000-0x0000000013180000-memory.dmp upx behavioral1/files/0x000b00000001225f-6.dat upx behavioral1/memory/2796-22-0x0000000013110000-0x0000000013180000-memory.dmp upx behavioral1/memory/1816-81-0x0000000013110000-0x0000000013180000-memory.dmp upx behavioral1/memory/712-97-0x0000000013110000-0x0000000013180000-memory.dmp upx behavioral1/memory/2392-162-0x0000000013110000-0x0000000013180000-memory.dmp upx behavioral1/memory/2648-198-0x0000000013110000-0x0000000013180000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 48 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebc3cef94419ec4e63728fa50198a543_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdc32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 784 ebc3cef94419ec4e63728fa50198a543_JaffaCakes118.exe 784 ebc3cef94419ec4e63728fa50198a543_JaffaCakes118.exe 1712 igfxdc32.exe 1712 igfxdc32.exe 2796 igfxdc32.exe 2796 igfxdc32.exe 2272 igfxdc32.exe 2272 igfxdc32.exe 2744 igfxdc32.exe 2744 igfxdc32.exe 2664 igfxdc32.exe 2664 igfxdc32.exe 1096 igfxdc32.exe 1096 igfxdc32.exe 1508 igfxdc32.exe 1508 igfxdc32.exe 876 igfxdc32.exe 876 igfxdc32.exe 1028 igfxdc32.exe 1028 igfxdc32.exe 2928 igfxdc32.exe 2928 igfxdc32.exe 1816 igfxdc32.exe 1816 igfxdc32.exe 1144 igfxdc32.exe 1144 igfxdc32.exe 712 igfxdc32.exe 712 igfxdc32.exe 928 igfxdc32.exe 928 igfxdc32.exe 1544 igfxdc32.exe 1544 igfxdc32.exe 3004 igfxdc32.exe 3004 igfxdc32.exe 820 igfxdc32.exe 820 igfxdc32.exe 896 igfxdc32.exe 896 igfxdc32.exe 2352 igfxdc32.exe 2352 igfxdc32.exe 2128 igfxdc32.exe 2128 igfxdc32.exe 1712 igfxdc32.exe 1712 igfxdc32.exe 1304 igfxdc32.exe 1304 igfxdc32.exe 2660 igfxdc32.exe 2660 igfxdc32.exe 2936 igfxdc32.exe 2936 igfxdc32.exe 2564 igfxdc32.exe 2564 igfxdc32.exe 3056 igfxdc32.exe 3056 igfxdc32.exe 1684 igfxdc32.exe 1684 igfxdc32.exe 2876 igfxdc32.exe 2876 igfxdc32.exe 2612 igfxdc32.exe 2612 igfxdc32.exe 2880 igfxdc32.exe 2880 igfxdc32.exe 1644 igfxdc32.exe 1644 igfxdc32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 784 wrote to memory of 1712 784 ebc3cef94419ec4e63728fa50198a543_JaffaCakes118.exe 31 PID 784 wrote to memory of 1712 784 ebc3cef94419ec4e63728fa50198a543_JaffaCakes118.exe 31 PID 784 wrote to memory of 1712 784 ebc3cef94419ec4e63728fa50198a543_JaffaCakes118.exe 31 PID 784 wrote to memory of 1712 784 ebc3cef94419ec4e63728fa50198a543_JaffaCakes118.exe 31 PID 1712 wrote to memory of 2796 1712 igfxdc32.exe 32 PID 1712 wrote to memory of 2796 1712 igfxdc32.exe 32 PID 1712 wrote to memory of 2796 1712 igfxdc32.exe 32 PID 1712 wrote to memory of 2796 1712 igfxdc32.exe 32 PID 2796 wrote to memory of 2272 2796 igfxdc32.exe 33 PID 2796 wrote to memory of 2272 2796 igfxdc32.exe 33 PID 2796 wrote to memory of 2272 2796 igfxdc32.exe 33 PID 2796 wrote to memory of 2272 2796 igfxdc32.exe 33 PID 2272 wrote to memory of 2744 2272 igfxdc32.exe 34 PID 2272 wrote to memory of 2744 2272 igfxdc32.exe 34 PID 2272 wrote to memory of 2744 2272 igfxdc32.exe 34 PID 2272 wrote to memory of 2744 2272 igfxdc32.exe 34 PID 2744 wrote to memory of 2664 2744 igfxdc32.exe 35 PID 2744 wrote to memory of 2664 2744 igfxdc32.exe 35 PID 2744 wrote to memory of 2664 2744 igfxdc32.exe 35 PID 2744 wrote to memory of 2664 2744 igfxdc32.exe 35 PID 2664 wrote to memory of 1096 2664 igfxdc32.exe 36 PID 2664 wrote to memory of 1096 2664 igfxdc32.exe 36 PID 2664 wrote to memory of 1096 2664 igfxdc32.exe 36 PID 2664 wrote to memory of 1096 2664 igfxdc32.exe 36 PID 1096 wrote to memory of 1508 1096 igfxdc32.exe 37 PID 1096 wrote to memory of 1508 1096 igfxdc32.exe 37 PID 1096 wrote to memory of 1508 1096 igfxdc32.exe 37 PID 1096 wrote to memory of 1508 1096 igfxdc32.exe 37 PID 1508 wrote to memory of 876 1508 igfxdc32.exe 38 PID 1508 wrote to memory of 876 1508 igfxdc32.exe 38 PID 1508 wrote to memory of 876 1508 igfxdc32.exe 38 PID 1508 wrote to memory of 876 1508 igfxdc32.exe 38 PID 876 wrote to memory of 1028 876 igfxdc32.exe 39 PID 876 wrote to memory of 1028 876 igfxdc32.exe 39 PID 876 wrote to memory of 1028 876 igfxdc32.exe 39 PID 876 wrote to memory of 1028 876 igfxdc32.exe 39 PID 1028 wrote to memory of 2928 1028 igfxdc32.exe 40 PID 1028 wrote to memory of 2928 1028 igfxdc32.exe 40 PID 1028 wrote to memory of 2928 1028 igfxdc32.exe 40 PID 1028 wrote to memory of 2928 1028 igfxdc32.exe 40 PID 2928 wrote to memory of 1816 2928 igfxdc32.exe 41 PID 2928 wrote to memory of 1816 2928 igfxdc32.exe 41 PID 2928 wrote to memory of 1816 2928 igfxdc32.exe 41 PID 2928 wrote to memory of 1816 2928 igfxdc32.exe 41 PID 1816 wrote to memory of 1144 1816 igfxdc32.exe 42 PID 1816 wrote to memory of 1144 1816 igfxdc32.exe 42 PID 1816 wrote to memory of 1144 1816 igfxdc32.exe 42 PID 1816 wrote to memory of 1144 1816 igfxdc32.exe 42 PID 1144 wrote to memory of 712 1144 igfxdc32.exe 43 PID 1144 wrote to memory of 712 1144 igfxdc32.exe 43 PID 1144 wrote to memory of 712 1144 igfxdc32.exe 43 PID 1144 wrote to memory of 712 1144 igfxdc32.exe 43 PID 712 wrote to memory of 928 712 igfxdc32.exe 44 PID 712 wrote to memory of 928 712 igfxdc32.exe 44 PID 712 wrote to memory of 928 712 igfxdc32.exe 44 PID 712 wrote to memory of 928 712 igfxdc32.exe 44 PID 928 wrote to memory of 1544 928 igfxdc32.exe 45 PID 928 wrote to memory of 1544 928 igfxdc32.exe 45 PID 928 wrote to memory of 1544 928 igfxdc32.exe 45 PID 928 wrote to memory of 1544 928 igfxdc32.exe 45 PID 1544 wrote to memory of 3004 1544 igfxdc32.exe 46 PID 1544 wrote to memory of 3004 1544 igfxdc32.exe 46 PID 1544 wrote to memory of 3004 1544 igfxdc32.exe 46 PID 1544 wrote to memory of 3004 1544 igfxdc32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebc3cef94419ec4e63728fa50198a543_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ebc3cef94419ec4e63728fa50198a543_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Users\Admin\AppData\Local\Temp\EBC3CE~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3004 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:820 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:896 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2352 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2128 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1712 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1304 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2660 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2936 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2564 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3056 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1684 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2876 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2612 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2880 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1644 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2940 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2392 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1812 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1044 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1872 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2052 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1560 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1784 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:900 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:624 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1512 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:496 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1788 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2780 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:768 -
C:\Windows\SysWOW64\igfxdc32.exe"C:\Windows\system32\igfxdc32.exe" C:\Windows\SysWOW64\igfxdc32.exe48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2648
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD5ebc3cef94419ec4e63728fa50198a543
SHA126565e91c1a93a49811bfdd8fa467a030260e834
SHA25656a40d09a61719b5b6f104dba4cdfd156387531d980c56726929f5b5973cbdae
SHA51274455e1bfceb93beb3b51ba6f020c5c88af290f2f7c80dcf2c460cb2a52b7589823096e01a9310fe89b8783c0473ad8f33d8b3e55a10b8584fb6ff98a70eb563