Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 22:26
Static task
static1
Behavioral task
behavioral1
Sample
f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe
-
Size
361KB
-
MD5
f6050e141fd57f5bd30f6a6a59200002
-
SHA1
d94b5a399974d5c1b3c61fea2d8f96c32f4dbd95
-
SHA256
dbb9c508474f2afac3b0f9addb0d617773bfd4ea47b2e0d55d8833d11b420f67
-
SHA512
b521eec5d49d2ade2b3e279ca3b1552ac05a0bf4b330d0129c14ada621675d1d49acc1c5b7327a55c0eb9aa44fd34cc2f49580af7918d198d37627148b0e6df2
-
SSDEEP
3072:7D0Gvk2CF0CYG/ci9Hye10KNvfbRPcFO5/9oyvmMXGfI5XFz4lnDIA4FArOyTDcG:knLYIPeKZF0FO5/9oyOMXGCA4dQwg
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 43 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxscr32.exe -
Deletes itself 1 IoCs
pid Process 376 igfxscr32.exe -
Executes dropped EXE 43 IoCs
pid Process 376 igfxscr32.exe 4688 igfxscr32.exe 4680 igfxscr32.exe 1412 igfxscr32.exe 3768 igfxscr32.exe 4428 igfxscr32.exe 4352 igfxscr32.exe 2904 igfxscr32.exe 5060 igfxscr32.exe 2352 igfxscr32.exe 4920 igfxscr32.exe 4032 igfxscr32.exe 4536 igfxscr32.exe 3172 igfxscr32.exe 1828 igfxscr32.exe 32 igfxscr32.exe 1240 igfxscr32.exe 4500 igfxscr32.exe 3092 igfxscr32.exe 2232 igfxscr32.exe 216 igfxscr32.exe 3304 igfxscr32.exe 5048 igfxscr32.exe 880 igfxscr32.exe 60 igfxscr32.exe 4548 igfxscr32.exe 4660 igfxscr32.exe 4672 igfxscr32.exe 4416 igfxscr32.exe 1820 igfxscr32.exe 1260 igfxscr32.exe 5004 igfxscr32.exe 536 igfxscr32.exe 3884 igfxscr32.exe 3988 igfxscr32.exe 4084 igfxscr32.exe 1672 igfxscr32.exe 3172 igfxscr32.exe 4548 igfxscr32.exe 4332 igfxscr32.exe 2920 igfxscr32.exe 4940 igfxscr32.exe 2592 igfxscr32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxscr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxscr32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File opened for modification C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxscr32.exe File created C:\Windows\SysWOW64\igfxscr32.exe igfxscr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 43 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxscr32.exe -
Modifies registry class 43 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxscr32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 376 igfxscr32.exe 376 igfxscr32.exe 376 igfxscr32.exe 376 igfxscr32.exe 376 igfxscr32.exe 376 igfxscr32.exe 376 igfxscr32.exe 376 igfxscr32.exe 376 igfxscr32.exe 376 igfxscr32.exe 376 igfxscr32.exe 376 igfxscr32.exe 376 igfxscr32.exe 376 igfxscr32.exe 376 igfxscr32.exe 376 igfxscr32.exe 376 igfxscr32.exe 376 igfxscr32.exe 376 igfxscr32.exe 376 igfxscr32.exe 376 igfxscr32.exe 376 igfxscr32.exe 376 igfxscr32.exe 376 igfxscr32.exe 376 igfxscr32.exe 376 igfxscr32.exe 376 igfxscr32.exe 376 igfxscr32.exe 376 igfxscr32.exe 376 igfxscr32.exe 4688 igfxscr32.exe 4688 igfxscr32.exe 4688 igfxscr32.exe 4688 igfxscr32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2420 wrote to memory of 376 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 83 PID 2420 wrote to memory of 376 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 83 PID 2420 wrote to memory of 376 2420 f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe 83 PID 376 wrote to memory of 4688 376 igfxscr32.exe 84 PID 376 wrote to memory of 4688 376 igfxscr32.exe 84 PID 376 wrote to memory of 4688 376 igfxscr32.exe 84 PID 4688 wrote to memory of 4680 4688 igfxscr32.exe 87 PID 4688 wrote to memory of 4680 4688 igfxscr32.exe 87 PID 4688 wrote to memory of 4680 4688 igfxscr32.exe 87 PID 4680 wrote to memory of 1412 4680 igfxscr32.exe 93 PID 4680 wrote to memory of 1412 4680 igfxscr32.exe 93 PID 4680 wrote to memory of 1412 4680 igfxscr32.exe 93 PID 1412 wrote to memory of 3768 1412 igfxscr32.exe 98 PID 1412 wrote to memory of 3768 1412 igfxscr32.exe 98 PID 1412 wrote to memory of 3768 1412 igfxscr32.exe 98 PID 3768 wrote to memory of 4428 3768 igfxscr32.exe 100 PID 3768 wrote to memory of 4428 3768 igfxscr32.exe 100 PID 3768 wrote to memory of 4428 3768 igfxscr32.exe 100 PID 4428 wrote to memory of 4352 4428 igfxscr32.exe 101 PID 4428 wrote to memory of 4352 4428 igfxscr32.exe 101 PID 4428 wrote to memory of 4352 4428 igfxscr32.exe 101 PID 4352 wrote to memory of 2904 4352 igfxscr32.exe 102 PID 4352 wrote to memory of 2904 4352 igfxscr32.exe 102 PID 4352 wrote to memory of 2904 4352 igfxscr32.exe 102 PID 2904 wrote to memory of 5060 2904 igfxscr32.exe 103 PID 2904 wrote to memory of 5060 2904 igfxscr32.exe 103 PID 2904 wrote to memory of 5060 2904 igfxscr32.exe 103 PID 5060 wrote to memory of 2352 5060 igfxscr32.exe 107 PID 5060 wrote to memory of 2352 5060 igfxscr32.exe 107 PID 5060 wrote to memory of 2352 5060 igfxscr32.exe 107 PID 2352 wrote to memory of 4920 2352 igfxscr32.exe 108 PID 2352 wrote to memory of 4920 2352 igfxscr32.exe 108 PID 2352 wrote to memory of 4920 2352 igfxscr32.exe 108 PID 4920 wrote to memory of 4032 4920 igfxscr32.exe 109 PID 4920 wrote to memory of 4032 4920 igfxscr32.exe 109 PID 4920 wrote to memory of 4032 4920 igfxscr32.exe 109 PID 4032 wrote to memory of 4536 4032 igfxscr32.exe 110 PID 4032 wrote to memory of 4536 4032 igfxscr32.exe 110 PID 4032 wrote to memory of 4536 4032 igfxscr32.exe 110 PID 4536 wrote to memory of 3172 4536 igfxscr32.exe 111 PID 4536 wrote to memory of 3172 4536 igfxscr32.exe 111 PID 4536 wrote to memory of 3172 4536 igfxscr32.exe 111 PID 3172 wrote to memory of 1828 3172 igfxscr32.exe 112 PID 3172 wrote to memory of 1828 3172 igfxscr32.exe 112 PID 3172 wrote to memory of 1828 3172 igfxscr32.exe 112 PID 1828 wrote to memory of 32 1828 igfxscr32.exe 113 PID 1828 wrote to memory of 32 1828 igfxscr32.exe 113 PID 1828 wrote to memory of 32 1828 igfxscr32.exe 113 PID 32 wrote to memory of 1240 32 igfxscr32.exe 114 PID 32 wrote to memory of 1240 32 igfxscr32.exe 114 PID 32 wrote to memory of 1240 32 igfxscr32.exe 114 PID 1240 wrote to memory of 4500 1240 igfxscr32.exe 115 PID 1240 wrote to memory of 4500 1240 igfxscr32.exe 115 PID 1240 wrote to memory of 4500 1240 igfxscr32.exe 115 PID 4500 wrote to memory of 3092 4500 igfxscr32.exe 117 PID 4500 wrote to memory of 3092 4500 igfxscr32.exe 117 PID 4500 wrote to memory of 3092 4500 igfxscr32.exe 117 PID 3092 wrote to memory of 2232 3092 igfxscr32.exe 118 PID 3092 wrote to memory of 2232 3092 igfxscr32.exe 118 PID 3092 wrote to memory of 2232 3092 igfxscr32.exe 118 PID 2232 wrote to memory of 216 2232 igfxscr32.exe 119 PID 2232 wrote to memory of 216 2232 igfxscr32.exe 119 PID 2232 wrote to memory of 216 2232 igfxscr32.exe 119 PID 216 wrote to memory of 3304 216 igfxscr32.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f6050e141fd57f5bd30f6a6a59200002_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Users\Admin\AppData\Local\Temp\F6050E~1.EXE2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE3⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE5⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE7⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE9⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE11⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE13⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE15⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE17⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE19⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE21⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE23⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3304 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5048 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE25⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:880 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:60 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE27⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4548 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4660 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE29⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4672 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4416 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE31⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1820 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1260 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE33⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5004 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:536 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE35⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3884 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3988 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE37⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4084 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1672 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE39⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3172 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4548 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE41⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4332 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2920 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE43⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4940 -
C:\Windows\SysWOW64\igfxscr32.exe"C:\Windows\system32\igfxscr32.exe" C:\Windows\SysWOW64\IGFXSC~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
PID:2592
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
361KB
MD5f6050e141fd57f5bd30f6a6a59200002
SHA1d94b5a399974d5c1b3c61fea2d8f96c32f4dbd95
SHA256dbb9c508474f2afac3b0f9addb0d617773bfd4ea47b2e0d55d8833d11b420f67
SHA512b521eec5d49d2ade2b3e279ca3b1552ac05a0bf4b330d0129c14ada621675d1d49acc1c5b7327a55c0eb9aa44fd34cc2f49580af7918d198d37627148b0e6df2