Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 04:31
Static task
static1
Behavioral task
behavioral1
Sample
f750aeee6ba230959de873427befda57_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f750aeee6ba230959de873427befda57_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f750aeee6ba230959de873427befda57_JaffaCakes118.exe
-
Size
252KB
-
MD5
f750aeee6ba230959de873427befda57
-
SHA1
457ff5d34f5c49e6c49a038eb1b2e76dde91f3da
-
SHA256
5daa46364839ea184b7ea01acb4b56837e0194620f13613a98a32a4f314c7e7b
-
SHA512
a505df8a8f7bf6e02139f4f038593075e35b2887523b821e481d5eabcdc2e87831954eee632e28664193d155de8562463f00e11b7090bf3d220dfc9b9f2ecfeb
-
SSDEEP
6144:90Dd6+SD+dYnY9cCxaTZ2EhCDbRqJyzkAif2gFjKA:OM+SD+2n7Cxa9xCRkFAs2gFe
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 1952 igfxdxr32.exe -
Executes dropped EXE 48 IoCs
pid Process 1952 igfxdxr32.exe 2776 igfxdxr32.exe 2800 igfxdxr32.exe 2636 igfxdxr32.exe 2112 igfxdxr32.exe 2020 igfxdxr32.exe 2848 igfxdxr32.exe 3004 igfxdxr32.exe 2488 igfxdxr32.exe 2180 igfxdxr32.exe 2096 igfxdxr32.exe 2504 igfxdxr32.exe 836 igfxdxr32.exe 916 igfxdxr32.exe 1784 igfxdxr32.exe 2536 igfxdxr32.exe 2412 igfxdxr32.exe 2280 igfxdxr32.exe 2012 igfxdxr32.exe 2884 igfxdxr32.exe 2796 igfxdxr32.exe 2052 igfxdxr32.exe 2304 igfxdxr32.exe 2028 igfxdxr32.exe 1668 igfxdxr32.exe 2840 igfxdxr32.exe 3016 igfxdxr32.exe 800 igfxdxr32.exe 2268 igfxdxr32.exe 1148 igfxdxr32.exe 2152 igfxdxr32.exe 1920 igfxdxr32.exe 2024 igfxdxr32.exe 616 igfxdxr32.exe 836 igfxdxr32.exe 1032 igfxdxr32.exe 2072 igfxdxr32.exe 1472 igfxdxr32.exe 2320 igfxdxr32.exe 2340 igfxdxr32.exe 2916 igfxdxr32.exe 3000 igfxdxr32.exe 1796 igfxdxr32.exe 2420 igfxdxr32.exe 2928 igfxdxr32.exe 680 igfxdxr32.exe 2636 igfxdxr32.exe 840 igfxdxr32.exe -
Loads dropped DLL 64 IoCs
pid Process 2512 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 2512 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 1952 igfxdxr32.exe 1952 igfxdxr32.exe 2776 igfxdxr32.exe 2776 igfxdxr32.exe 2800 igfxdxr32.exe 2800 igfxdxr32.exe 2636 igfxdxr32.exe 2636 igfxdxr32.exe 2112 igfxdxr32.exe 2112 igfxdxr32.exe 2020 igfxdxr32.exe 2020 igfxdxr32.exe 2848 igfxdxr32.exe 2848 igfxdxr32.exe 3004 igfxdxr32.exe 3004 igfxdxr32.exe 2488 igfxdxr32.exe 2488 igfxdxr32.exe 2180 igfxdxr32.exe 2180 igfxdxr32.exe 2096 igfxdxr32.exe 2096 igfxdxr32.exe 2504 igfxdxr32.exe 2504 igfxdxr32.exe 836 igfxdxr32.exe 836 igfxdxr32.exe 916 igfxdxr32.exe 916 igfxdxr32.exe 1784 igfxdxr32.exe 1784 igfxdxr32.exe 2536 igfxdxr32.exe 2536 igfxdxr32.exe 2412 igfxdxr32.exe 2412 igfxdxr32.exe 2280 igfxdxr32.exe 2280 igfxdxr32.exe 2012 igfxdxr32.exe 2012 igfxdxr32.exe 2884 igfxdxr32.exe 2884 igfxdxr32.exe 2796 igfxdxr32.exe 2796 igfxdxr32.exe 2052 igfxdxr32.exe 2052 igfxdxr32.exe 2304 igfxdxr32.exe 2304 igfxdxr32.exe 2028 igfxdxr32.exe 2028 igfxdxr32.exe 1668 igfxdxr32.exe 1668 igfxdxr32.exe 2840 igfxdxr32.exe 2840 igfxdxr32.exe 3016 igfxdxr32.exe 3016 igfxdxr32.exe 800 igfxdxr32.exe 800 igfxdxr32.exe 2268 igfxdxr32.exe 2268 igfxdxr32.exe 1148 igfxdxr32.exe 1148 igfxdxr32.exe 2152 igfxdxr32.exe 2152 igfxdxr32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 f750aeee6ba230959de873427befda57_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ f750aeee6ba230959de873427befda57_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 49 IoCs
pid Process 2512 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 1952 igfxdxr32.exe 2776 igfxdxr32.exe 2800 igfxdxr32.exe 2636 igfxdxr32.exe 2112 igfxdxr32.exe 2020 igfxdxr32.exe 2848 igfxdxr32.exe 3004 igfxdxr32.exe 2488 igfxdxr32.exe 2180 igfxdxr32.exe 2096 igfxdxr32.exe 2504 igfxdxr32.exe 836 igfxdxr32.exe 916 igfxdxr32.exe 1784 igfxdxr32.exe 2536 igfxdxr32.exe 2412 igfxdxr32.exe 2280 igfxdxr32.exe 2012 igfxdxr32.exe 2884 igfxdxr32.exe 2796 igfxdxr32.exe 2052 igfxdxr32.exe 2304 igfxdxr32.exe 2028 igfxdxr32.exe 1668 igfxdxr32.exe 2840 igfxdxr32.exe 3016 igfxdxr32.exe 800 igfxdxr32.exe 2268 igfxdxr32.exe 1148 igfxdxr32.exe 2152 igfxdxr32.exe 1920 igfxdxr32.exe 2024 igfxdxr32.exe 616 igfxdxr32.exe 836 igfxdxr32.exe 1032 igfxdxr32.exe 2072 igfxdxr32.exe 1472 igfxdxr32.exe 2320 igfxdxr32.exe 2340 igfxdxr32.exe 2916 igfxdxr32.exe 3000 igfxdxr32.exe 1796 igfxdxr32.exe 2420 igfxdxr32.exe 2928 igfxdxr32.exe 680 igfxdxr32.exe 2636 igfxdxr32.exe 840 igfxdxr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 48 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f750aeee6ba230959de873427befda57_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2512 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 2512 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 2512 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 2512 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 2512 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 2512 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 2512 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 2512 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 2512 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 2512 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 2512 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 2512 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 2512 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 2512 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 2512 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 2512 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 1952 igfxdxr32.exe 1952 igfxdxr32.exe 1952 igfxdxr32.exe 1952 igfxdxr32.exe 1952 igfxdxr32.exe 1952 igfxdxr32.exe 1952 igfxdxr32.exe 1952 igfxdxr32.exe 1952 igfxdxr32.exe 1952 igfxdxr32.exe 1952 igfxdxr32.exe 1952 igfxdxr32.exe 1952 igfxdxr32.exe 1952 igfxdxr32.exe 1952 igfxdxr32.exe 1952 igfxdxr32.exe 2776 igfxdxr32.exe 2776 igfxdxr32.exe 2776 igfxdxr32.exe 2776 igfxdxr32.exe 2776 igfxdxr32.exe 2776 igfxdxr32.exe 2776 igfxdxr32.exe 2776 igfxdxr32.exe 2776 igfxdxr32.exe 2776 igfxdxr32.exe 2776 igfxdxr32.exe 2776 igfxdxr32.exe 2776 igfxdxr32.exe 2776 igfxdxr32.exe 2776 igfxdxr32.exe 2776 igfxdxr32.exe 2800 igfxdxr32.exe 2800 igfxdxr32.exe 2800 igfxdxr32.exe 2800 igfxdxr32.exe 2800 igfxdxr32.exe 2800 igfxdxr32.exe 2800 igfxdxr32.exe 2800 igfxdxr32.exe 2800 igfxdxr32.exe 2800 igfxdxr32.exe 2800 igfxdxr32.exe 2800 igfxdxr32.exe 2800 igfxdxr32.exe 2800 igfxdxr32.exe 2800 igfxdxr32.exe 2800 igfxdxr32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2512 wrote to memory of 1952 2512 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 30 PID 2512 wrote to memory of 1952 2512 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 30 PID 2512 wrote to memory of 1952 2512 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 30 PID 2512 wrote to memory of 1952 2512 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 30 PID 1952 wrote to memory of 2776 1952 igfxdxr32.exe 32 PID 1952 wrote to memory of 2776 1952 igfxdxr32.exe 32 PID 1952 wrote to memory of 2776 1952 igfxdxr32.exe 32 PID 1952 wrote to memory of 2776 1952 igfxdxr32.exe 32 PID 2776 wrote to memory of 2800 2776 igfxdxr32.exe 33 PID 2776 wrote to memory of 2800 2776 igfxdxr32.exe 33 PID 2776 wrote to memory of 2800 2776 igfxdxr32.exe 33 PID 2776 wrote to memory of 2800 2776 igfxdxr32.exe 33 PID 2800 wrote to memory of 2636 2800 igfxdxr32.exe 34 PID 2800 wrote to memory of 2636 2800 igfxdxr32.exe 34 PID 2800 wrote to memory of 2636 2800 igfxdxr32.exe 34 PID 2800 wrote to memory of 2636 2800 igfxdxr32.exe 34 PID 2636 wrote to memory of 2112 2636 igfxdxr32.exe 35 PID 2636 wrote to memory of 2112 2636 igfxdxr32.exe 35 PID 2636 wrote to memory of 2112 2636 igfxdxr32.exe 35 PID 2636 wrote to memory of 2112 2636 igfxdxr32.exe 35 PID 2112 wrote to memory of 2020 2112 igfxdxr32.exe 36 PID 2112 wrote to memory of 2020 2112 igfxdxr32.exe 36 PID 2112 wrote to memory of 2020 2112 igfxdxr32.exe 36 PID 2112 wrote to memory of 2020 2112 igfxdxr32.exe 36 PID 2020 wrote to memory of 2848 2020 igfxdxr32.exe 37 PID 2020 wrote to memory of 2848 2020 igfxdxr32.exe 37 PID 2020 wrote to memory of 2848 2020 igfxdxr32.exe 37 PID 2020 wrote to memory of 2848 2020 igfxdxr32.exe 37 PID 2848 wrote to memory of 3004 2848 igfxdxr32.exe 38 PID 2848 wrote to memory of 3004 2848 igfxdxr32.exe 38 PID 2848 wrote to memory of 3004 2848 igfxdxr32.exe 38 PID 2848 wrote to memory of 3004 2848 igfxdxr32.exe 38 PID 3004 wrote to memory of 2488 3004 igfxdxr32.exe 39 PID 3004 wrote to memory of 2488 3004 igfxdxr32.exe 39 PID 3004 wrote to memory of 2488 3004 igfxdxr32.exe 39 PID 3004 wrote to memory of 2488 3004 igfxdxr32.exe 39 PID 2488 wrote to memory of 2180 2488 igfxdxr32.exe 40 PID 2488 wrote to memory of 2180 2488 igfxdxr32.exe 40 PID 2488 wrote to memory of 2180 2488 igfxdxr32.exe 40 PID 2488 wrote to memory of 2180 2488 igfxdxr32.exe 40 PID 2180 wrote to memory of 2096 2180 igfxdxr32.exe 41 PID 2180 wrote to memory of 2096 2180 igfxdxr32.exe 41 PID 2180 wrote to memory of 2096 2180 igfxdxr32.exe 41 PID 2180 wrote to memory of 2096 2180 igfxdxr32.exe 41 PID 2096 wrote to memory of 2504 2096 igfxdxr32.exe 42 PID 2096 wrote to memory of 2504 2096 igfxdxr32.exe 42 PID 2096 wrote to memory of 2504 2096 igfxdxr32.exe 42 PID 2096 wrote to memory of 2504 2096 igfxdxr32.exe 42 PID 2504 wrote to memory of 836 2504 igfxdxr32.exe 43 PID 2504 wrote to memory of 836 2504 igfxdxr32.exe 43 PID 2504 wrote to memory of 836 2504 igfxdxr32.exe 43 PID 2504 wrote to memory of 836 2504 igfxdxr32.exe 43 PID 836 wrote to memory of 916 836 igfxdxr32.exe 44 PID 836 wrote to memory of 916 836 igfxdxr32.exe 44 PID 836 wrote to memory of 916 836 igfxdxr32.exe 44 PID 836 wrote to memory of 916 836 igfxdxr32.exe 44 PID 916 wrote to memory of 1784 916 igfxdxr32.exe 45 PID 916 wrote to memory of 1784 916 igfxdxr32.exe 45 PID 916 wrote to memory of 1784 916 igfxdxr32.exe 45 PID 916 wrote to memory of 1784 916 igfxdxr32.exe 45 PID 1784 wrote to memory of 2536 1784 igfxdxr32.exe 46 PID 1784 wrote to memory of 2536 1784 igfxdxr32.exe 46 PID 1784 wrote to memory of 2536 1784 igfxdxr32.exe 46 PID 1784 wrote to memory of 2536 1784 igfxdxr32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\f750aeee6ba230959de873427befda57_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f750aeee6ba230959de873427befda57_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Users\Admin\AppData\Local\Temp\F750AE~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2536 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2412 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2280 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2012 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2884 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2796 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2052 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2304 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2028 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1668 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2840 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3016 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:800 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2268 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1148 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2152 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1920 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE34⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2024 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:616 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:836 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1032 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2072 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1472 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2320 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2340 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2916 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3000 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1796 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2420 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2928 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:680 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2636 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE49⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:840
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5f750aeee6ba230959de873427befda57
SHA1457ff5d34f5c49e6c49a038eb1b2e76dde91f3da
SHA2565daa46364839ea184b7ea01acb4b56837e0194620f13613a98a32a4f314c7e7b
SHA512a505df8a8f7bf6e02139f4f038593075e35b2887523b821e481d5eabcdc2e87831954eee632e28664193d155de8562463f00e11b7090bf3d220dfc9b9f2ecfeb