Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-12-2024 17:51
Static task
static1
Behavioral task
behavioral1
Sample
eff94973f607d20164337653e30f98f9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eff94973f607d20164337653e30f98f9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
eff94973f607d20164337653e30f98f9_JaffaCakes118.exe
-
Size
315KB
-
MD5
eff94973f607d20164337653e30f98f9
-
SHA1
c2e56161d9d0ac5ae58fff06d09ecac960c9c2e1
-
SHA256
957f96e1cf35fbc0bba2938fcf7033ded834f355524755e0f2c5c30226d3d174
-
SHA512
0bda987061b5c6fa9b72873c753fb9cd839bf0ee77fcfc64d42c1bc7f79d0d924ea60295a5efcb21c1240d5ce4b100cc1465e60ff821e14d6b4072368d5372da
-
SSDEEP
3072:sgCnAPipsi5eN4k1b7uDidYtgN5lbevhQL3Z9vKnqpeMcN87XdC1Gu:s1Aa6iUmk1u4pqv2XvnUwC
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 45 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation eff94973f607d20164337653e30f98f9_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxdpv32.exe -
Deletes itself 1 IoCs
pid Process 3976 igfxdpv32.exe -
Executes dropped EXE 45 IoCs
pid Process 3976 igfxdpv32.exe 4900 igfxdpv32.exe 3120 igfxdpv32.exe 2200 igfxdpv32.exe 4520 igfxdpv32.exe 4732 igfxdpv32.exe 2532 igfxdpv32.exe 4072 igfxdpv32.exe 3972 igfxdpv32.exe 1860 igfxdpv32.exe 1884 igfxdpv32.exe 3548 igfxdpv32.exe 1096 igfxdpv32.exe 1956 igfxdpv32.exe 3664 igfxdpv32.exe 4068 igfxdpv32.exe 4996 igfxdpv32.exe 3024 igfxdpv32.exe 4184 igfxdpv32.exe 312 igfxdpv32.exe 5108 igfxdpv32.exe 4576 igfxdpv32.exe 2668 igfxdpv32.exe 3716 igfxdpv32.exe 1340 igfxdpv32.exe 4416 igfxdpv32.exe 5116 igfxdpv32.exe 2984 igfxdpv32.exe 4444 igfxdpv32.exe 3212 igfxdpv32.exe 1476 igfxdpv32.exe 760 igfxdpv32.exe 512 igfxdpv32.exe 4972 igfxdpv32.exe 4200 igfxdpv32.exe 2752 igfxdpv32.exe 2616 igfxdpv32.exe 1500 igfxdpv32.exe 884 igfxdpv32.exe 1920 igfxdpv32.exe 2024 igfxdpv32.exe 3168 igfxdpv32.exe 2632 igfxdpv32.exe 4956 igfxdpv32.exe 4424 igfxdpv32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 eff94973f607d20164337653e30f98f9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpv32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File created C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File created C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File created C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File created C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File created C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpv32.exe File created C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File created C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpv32.exe File created C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File created C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpv32.exe File created C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpv32.exe File created C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File created C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpv32.exe File created C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpv32.exe File created C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File created C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File created C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File created C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File created C:\Windows\SysWOW64\igfxdpv32.exe eff94973f607d20164337653e30f98f9_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File created C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File created C:\Windows\SysWOW64\igfxdpv32.exe igfxdpv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpv32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 45 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eff94973f607d20164337653e30f98f9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpv32.exe -
Modifies registry class 45 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ eff94973f607d20164337653e30f98f9_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpv32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4784 eff94973f607d20164337653e30f98f9_JaffaCakes118.exe 4784 eff94973f607d20164337653e30f98f9_JaffaCakes118.exe 3976 igfxdpv32.exe 3976 igfxdpv32.exe 4900 igfxdpv32.exe 4900 igfxdpv32.exe 3120 igfxdpv32.exe 3120 igfxdpv32.exe 2200 igfxdpv32.exe 2200 igfxdpv32.exe 4520 igfxdpv32.exe 4520 igfxdpv32.exe 4732 igfxdpv32.exe 4732 igfxdpv32.exe 2532 igfxdpv32.exe 2532 igfxdpv32.exe 4072 igfxdpv32.exe 4072 igfxdpv32.exe 3972 igfxdpv32.exe 3972 igfxdpv32.exe 1860 igfxdpv32.exe 1860 igfxdpv32.exe 1884 igfxdpv32.exe 1884 igfxdpv32.exe 3548 igfxdpv32.exe 3548 igfxdpv32.exe 1096 igfxdpv32.exe 1096 igfxdpv32.exe 1956 igfxdpv32.exe 1956 igfxdpv32.exe 3664 igfxdpv32.exe 3664 igfxdpv32.exe 4068 igfxdpv32.exe 4068 igfxdpv32.exe 4996 igfxdpv32.exe 4996 igfxdpv32.exe 3024 igfxdpv32.exe 3024 igfxdpv32.exe 4184 igfxdpv32.exe 4184 igfxdpv32.exe 312 igfxdpv32.exe 312 igfxdpv32.exe 5108 igfxdpv32.exe 5108 igfxdpv32.exe 4576 igfxdpv32.exe 4576 igfxdpv32.exe 2668 igfxdpv32.exe 2668 igfxdpv32.exe 3716 igfxdpv32.exe 3716 igfxdpv32.exe 1340 igfxdpv32.exe 1340 igfxdpv32.exe 4416 igfxdpv32.exe 4416 igfxdpv32.exe 5116 igfxdpv32.exe 5116 igfxdpv32.exe 2984 igfxdpv32.exe 2984 igfxdpv32.exe 4444 igfxdpv32.exe 4444 igfxdpv32.exe 3212 igfxdpv32.exe 3212 igfxdpv32.exe 1476 igfxdpv32.exe 1476 igfxdpv32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4784 wrote to memory of 3976 4784 eff94973f607d20164337653e30f98f9_JaffaCakes118.exe 83 PID 4784 wrote to memory of 3976 4784 eff94973f607d20164337653e30f98f9_JaffaCakes118.exe 83 PID 4784 wrote to memory of 3976 4784 eff94973f607d20164337653e30f98f9_JaffaCakes118.exe 83 PID 3976 wrote to memory of 4900 3976 igfxdpv32.exe 85 PID 3976 wrote to memory of 4900 3976 igfxdpv32.exe 85 PID 3976 wrote to memory of 4900 3976 igfxdpv32.exe 85 PID 4900 wrote to memory of 3120 4900 igfxdpv32.exe 86 PID 4900 wrote to memory of 3120 4900 igfxdpv32.exe 86 PID 4900 wrote to memory of 3120 4900 igfxdpv32.exe 86 PID 3120 wrote to memory of 2200 3120 igfxdpv32.exe 94 PID 3120 wrote to memory of 2200 3120 igfxdpv32.exe 94 PID 3120 wrote to memory of 2200 3120 igfxdpv32.exe 94 PID 2200 wrote to memory of 4520 2200 igfxdpv32.exe 97 PID 2200 wrote to memory of 4520 2200 igfxdpv32.exe 97 PID 2200 wrote to memory of 4520 2200 igfxdpv32.exe 97 PID 4520 wrote to memory of 4732 4520 igfxdpv32.exe 102 PID 4520 wrote to memory of 4732 4520 igfxdpv32.exe 102 PID 4520 wrote to memory of 4732 4520 igfxdpv32.exe 102 PID 4732 wrote to memory of 2532 4732 igfxdpv32.exe 103 PID 4732 wrote to memory of 2532 4732 igfxdpv32.exe 103 PID 4732 wrote to memory of 2532 4732 igfxdpv32.exe 103 PID 2532 wrote to memory of 4072 2532 igfxdpv32.exe 104 PID 2532 wrote to memory of 4072 2532 igfxdpv32.exe 104 PID 2532 wrote to memory of 4072 2532 igfxdpv32.exe 104 PID 4072 wrote to memory of 3972 4072 igfxdpv32.exe 105 PID 4072 wrote to memory of 3972 4072 igfxdpv32.exe 105 PID 4072 wrote to memory of 3972 4072 igfxdpv32.exe 105 PID 3972 wrote to memory of 1860 3972 igfxdpv32.exe 108 PID 3972 wrote to memory of 1860 3972 igfxdpv32.exe 108 PID 3972 wrote to memory of 1860 3972 igfxdpv32.exe 108 PID 1860 wrote to memory of 1884 1860 igfxdpv32.exe 110 PID 1860 wrote to memory of 1884 1860 igfxdpv32.exe 110 PID 1860 wrote to memory of 1884 1860 igfxdpv32.exe 110 PID 1884 wrote to memory of 3548 1884 igfxdpv32.exe 111 PID 1884 wrote to memory of 3548 1884 igfxdpv32.exe 111 PID 1884 wrote to memory of 3548 1884 igfxdpv32.exe 111 PID 3548 wrote to memory of 1096 3548 igfxdpv32.exe 112 PID 3548 wrote to memory of 1096 3548 igfxdpv32.exe 112 PID 3548 wrote to memory of 1096 3548 igfxdpv32.exe 112 PID 1096 wrote to memory of 1956 1096 igfxdpv32.exe 113 PID 1096 wrote to memory of 1956 1096 igfxdpv32.exe 113 PID 1096 wrote to memory of 1956 1096 igfxdpv32.exe 113 PID 1956 wrote to memory of 3664 1956 igfxdpv32.exe 114 PID 1956 wrote to memory of 3664 1956 igfxdpv32.exe 114 PID 1956 wrote to memory of 3664 1956 igfxdpv32.exe 114 PID 3664 wrote to memory of 4068 3664 igfxdpv32.exe 115 PID 3664 wrote to memory of 4068 3664 igfxdpv32.exe 115 PID 3664 wrote to memory of 4068 3664 igfxdpv32.exe 115 PID 4068 wrote to memory of 4996 4068 igfxdpv32.exe 116 PID 4068 wrote to memory of 4996 4068 igfxdpv32.exe 116 PID 4068 wrote to memory of 4996 4068 igfxdpv32.exe 116 PID 4996 wrote to memory of 3024 4996 igfxdpv32.exe 117 PID 4996 wrote to memory of 3024 4996 igfxdpv32.exe 117 PID 4996 wrote to memory of 3024 4996 igfxdpv32.exe 117 PID 3024 wrote to memory of 4184 3024 igfxdpv32.exe 119 PID 3024 wrote to memory of 4184 3024 igfxdpv32.exe 119 PID 3024 wrote to memory of 4184 3024 igfxdpv32.exe 119 PID 4184 wrote to memory of 312 4184 igfxdpv32.exe 120 PID 4184 wrote to memory of 312 4184 igfxdpv32.exe 120 PID 4184 wrote to memory of 312 4184 igfxdpv32.exe 120 PID 312 wrote to memory of 5108 312 igfxdpv32.exe 121 PID 312 wrote to memory of 5108 312 igfxdpv32.exe 121 PID 312 wrote to memory of 5108 312 igfxdpv32.exe 121 PID 5108 wrote to memory of 4576 5108 igfxdpv32.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\eff94973f607d20164337653e30f98f9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eff94973f607d20164337653e30f98f9_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Users\Admin\AppData\Local\Temp\EFF949~1.EXE2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE3⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE5⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE7⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE9⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE11⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE13⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE15⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE17⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE19⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE21⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE23⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4576 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2668 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE25⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3716 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1340 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE27⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4416 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5116 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE29⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2984 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4444 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE31⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3212 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1476 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE33⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:760 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:512 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE35⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4972 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4200 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE37⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2752 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2616 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE39⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1500 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:884 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE41⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1920 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2024 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE43⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3168 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2632 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE45⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4956 -
C:\Windows\SysWOW64\igfxdpv32.exe"C:\Windows\system32\igfxdpv32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE46⤵
- Executes dropped EXE
- Maps connected drives based on registry
PID:4424
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
315KB
MD5eff94973f607d20164337653e30f98f9
SHA1c2e56161d9d0ac5ae58fff06d09ecac960c9c2e1
SHA256957f96e1cf35fbc0bba2938fcf7033ded834f355524755e0f2c5c30226d3d174
SHA5120bda987061b5c6fa9b72873c753fb9cd839bf0ee77fcfc64d42c1bc7f79d0d924ea60295a5efcb21c1240d5ce4b100cc1465e60ff821e14d6b4072368d5372da