Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 04:31
Static task
static1
Behavioral task
behavioral1
Sample
f750aeee6ba230959de873427befda57_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f750aeee6ba230959de873427befda57_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f750aeee6ba230959de873427befda57_JaffaCakes118.exe
-
Size
252KB
-
MD5
f750aeee6ba230959de873427befda57
-
SHA1
457ff5d34f5c49e6c49a038eb1b2e76dde91f3da
-
SHA256
5daa46364839ea184b7ea01acb4b56837e0194620f13613a98a32a4f314c7e7b
-
SHA512
a505df8a8f7bf6e02139f4f038593075e35b2887523b821e481d5eabcdc2e87831954eee632e28664193d155de8562463f00e11b7090bf3d220dfc9b9f2ecfeb
-
SSDEEP
6144:90Dd6+SD+dYnY9cCxaTZ2EhCDbRqJyzkAif2gFjKA:OM+SD+2n7Cxa9xCRkFAs2gFe
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 45 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation f750aeee6ba230959de873427befda57_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation igfxdxr32.exe -
Deletes itself 1 IoCs
pid Process 756 igfxdxr32.exe -
Executes dropped EXE 45 IoCs
pid Process 756 igfxdxr32.exe 4188 igfxdxr32.exe 2880 igfxdxr32.exe 3876 igfxdxr32.exe 3036 igfxdxr32.exe 216 igfxdxr32.exe 3108 igfxdxr32.exe 3860 igfxdxr32.exe 1732 igfxdxr32.exe 1692 igfxdxr32.exe 4412 igfxdxr32.exe 4960 igfxdxr32.exe 2220 igfxdxr32.exe 4744 igfxdxr32.exe 4732 igfxdxr32.exe 408 igfxdxr32.exe 5108 igfxdxr32.exe 1428 igfxdxr32.exe 4992 igfxdxr32.exe 3688 igfxdxr32.exe 388 igfxdxr32.exe 2792 igfxdxr32.exe 2096 igfxdxr32.exe 1844 igfxdxr32.exe 4668 igfxdxr32.exe 892 igfxdxr32.exe 3984 igfxdxr32.exe 2788 igfxdxr32.exe 4428 igfxdxr32.exe 1768 igfxdxr32.exe 1732 igfxdxr32.exe 1712 igfxdxr32.exe 4856 igfxdxr32.exe 3708 igfxdxr32.exe 2144 igfxdxr32.exe 4808 igfxdxr32.exe 4436 igfxdxr32.exe 4292 igfxdxr32.exe 3736 igfxdxr32.exe 2832 igfxdxr32.exe 1236 igfxdxr32.exe 3556 igfxdxr32.exe 60 igfxdxr32.exe 4568 igfxdxr32.exe 1796 igfxdxr32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f750aeee6ba230959de873427befda57_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 f750aeee6ba230959de873427befda57_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe f750aeee6ba230959de873427befda57_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ f750aeee6ba230959de873427befda57_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 46 IoCs
pid Process 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 756 igfxdxr32.exe 4188 igfxdxr32.exe 2880 igfxdxr32.exe 3876 igfxdxr32.exe 3036 igfxdxr32.exe 216 igfxdxr32.exe 3108 igfxdxr32.exe 3860 igfxdxr32.exe 1732 igfxdxr32.exe 1692 igfxdxr32.exe 4412 igfxdxr32.exe 4960 igfxdxr32.exe 2220 igfxdxr32.exe 4744 igfxdxr32.exe 4732 igfxdxr32.exe 408 igfxdxr32.exe 5108 igfxdxr32.exe 1428 igfxdxr32.exe 4992 igfxdxr32.exe 3688 igfxdxr32.exe 388 igfxdxr32.exe 2792 igfxdxr32.exe 2096 igfxdxr32.exe 1844 igfxdxr32.exe 4668 igfxdxr32.exe 892 igfxdxr32.exe 3984 igfxdxr32.exe 2788 igfxdxr32.exe 4428 igfxdxr32.exe 1768 igfxdxr32.exe 1732 igfxdxr32.exe 1712 igfxdxr32.exe 4856 igfxdxr32.exe 3708 igfxdxr32.exe 2144 igfxdxr32.exe 4808 igfxdxr32.exe 4436 igfxdxr32.exe 4292 igfxdxr32.exe 3736 igfxdxr32.exe 2832 igfxdxr32.exe 1236 igfxdxr32.exe 3556 igfxdxr32.exe 60 igfxdxr32.exe 4568 igfxdxr32.exe 1796 igfxdxr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 45 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f750aeee6ba230959de873427befda57_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe -
Modifies registry class 45 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ f750aeee6ba230959de873427befda57_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdxr32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 756 igfxdxr32.exe 756 igfxdxr32.exe 756 igfxdxr32.exe 756 igfxdxr32.exe 756 igfxdxr32.exe 756 igfxdxr32.exe 756 igfxdxr32.exe 756 igfxdxr32.exe 756 igfxdxr32.exe 756 igfxdxr32.exe 756 igfxdxr32.exe 756 igfxdxr32.exe 756 igfxdxr32.exe 756 igfxdxr32.exe 756 igfxdxr32.exe 756 igfxdxr32.exe 756 igfxdxr32.exe 756 igfxdxr32.exe 756 igfxdxr32.exe 756 igfxdxr32.exe 756 igfxdxr32.exe 756 igfxdxr32.exe 756 igfxdxr32.exe 756 igfxdxr32.exe 756 igfxdxr32.exe 756 igfxdxr32.exe 756 igfxdxr32.exe 756 igfxdxr32.exe 756 igfxdxr32.exe 756 igfxdxr32.exe 756 igfxdxr32.exe 756 igfxdxr32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4440 wrote to memory of 756 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 84 PID 4440 wrote to memory of 756 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 84 PID 4440 wrote to memory of 756 4440 f750aeee6ba230959de873427befda57_JaffaCakes118.exe 84 PID 756 wrote to memory of 4188 756 igfxdxr32.exe 88 PID 756 wrote to memory of 4188 756 igfxdxr32.exe 88 PID 756 wrote to memory of 4188 756 igfxdxr32.exe 88 PID 4188 wrote to memory of 2880 4188 igfxdxr32.exe 91 PID 4188 wrote to memory of 2880 4188 igfxdxr32.exe 91 PID 4188 wrote to memory of 2880 4188 igfxdxr32.exe 91 PID 2880 wrote to memory of 3876 2880 igfxdxr32.exe 94 PID 2880 wrote to memory of 3876 2880 igfxdxr32.exe 94 PID 2880 wrote to memory of 3876 2880 igfxdxr32.exe 94 PID 3876 wrote to memory of 3036 3876 igfxdxr32.exe 95 PID 3876 wrote to memory of 3036 3876 igfxdxr32.exe 95 PID 3876 wrote to memory of 3036 3876 igfxdxr32.exe 95 PID 3036 wrote to memory of 216 3036 igfxdxr32.exe 96 PID 3036 wrote to memory of 216 3036 igfxdxr32.exe 96 PID 3036 wrote to memory of 216 3036 igfxdxr32.exe 96 PID 216 wrote to memory of 3108 216 igfxdxr32.exe 97 PID 216 wrote to memory of 3108 216 igfxdxr32.exe 97 PID 216 wrote to memory of 3108 216 igfxdxr32.exe 97 PID 3108 wrote to memory of 3860 3108 igfxdxr32.exe 98 PID 3108 wrote to memory of 3860 3108 igfxdxr32.exe 98 PID 3108 wrote to memory of 3860 3108 igfxdxr32.exe 98 PID 3860 wrote to memory of 1732 3860 igfxdxr32.exe 99 PID 3860 wrote to memory of 1732 3860 igfxdxr32.exe 99 PID 3860 wrote to memory of 1732 3860 igfxdxr32.exe 99 PID 1732 wrote to memory of 1692 1732 igfxdxr32.exe 101 PID 1732 wrote to memory of 1692 1732 igfxdxr32.exe 101 PID 1732 wrote to memory of 1692 1732 igfxdxr32.exe 101 PID 1692 wrote to memory of 4412 1692 igfxdxr32.exe 103 PID 1692 wrote to memory of 4412 1692 igfxdxr32.exe 103 PID 1692 wrote to memory of 4412 1692 igfxdxr32.exe 103 PID 4412 wrote to memory of 4960 4412 igfxdxr32.exe 104 PID 4412 wrote to memory of 4960 4412 igfxdxr32.exe 104 PID 4412 wrote to memory of 4960 4412 igfxdxr32.exe 104 PID 4960 wrote to memory of 2220 4960 igfxdxr32.exe 105 PID 4960 wrote to memory of 2220 4960 igfxdxr32.exe 105 PID 4960 wrote to memory of 2220 4960 igfxdxr32.exe 105 PID 2220 wrote to memory of 4744 2220 igfxdxr32.exe 106 PID 2220 wrote to memory of 4744 2220 igfxdxr32.exe 106 PID 2220 wrote to memory of 4744 2220 igfxdxr32.exe 106 PID 4744 wrote to memory of 4732 4744 igfxdxr32.exe 107 PID 4744 wrote to memory of 4732 4744 igfxdxr32.exe 107 PID 4744 wrote to memory of 4732 4744 igfxdxr32.exe 107 PID 4732 wrote to memory of 408 4732 igfxdxr32.exe 108 PID 4732 wrote to memory of 408 4732 igfxdxr32.exe 108 PID 4732 wrote to memory of 408 4732 igfxdxr32.exe 108 PID 408 wrote to memory of 5108 408 igfxdxr32.exe 109 PID 408 wrote to memory of 5108 408 igfxdxr32.exe 109 PID 408 wrote to memory of 5108 408 igfxdxr32.exe 109 PID 5108 wrote to memory of 1428 5108 igfxdxr32.exe 110 PID 5108 wrote to memory of 1428 5108 igfxdxr32.exe 110 PID 5108 wrote to memory of 1428 5108 igfxdxr32.exe 110 PID 1428 wrote to memory of 4992 1428 igfxdxr32.exe 111 PID 1428 wrote to memory of 4992 1428 igfxdxr32.exe 111 PID 1428 wrote to memory of 4992 1428 igfxdxr32.exe 111 PID 4992 wrote to memory of 3688 4992 igfxdxr32.exe 112 PID 4992 wrote to memory of 3688 4992 igfxdxr32.exe 112 PID 4992 wrote to memory of 3688 4992 igfxdxr32.exe 112 PID 3688 wrote to memory of 388 3688 igfxdxr32.exe 113 PID 3688 wrote to memory of 388 3688 igfxdxr32.exe 113 PID 3688 wrote to memory of 388 3688 igfxdxr32.exe 113 PID 388 wrote to memory of 2792 388 igfxdxr32.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\f750aeee6ba230959de873427befda57_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f750aeee6ba230959de873427befda57_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Users\Admin\AppData\Local\Temp\F750AE~1.EXE2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE3⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE5⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE7⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE9⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE11⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE13⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE15⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE17⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE19⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE21⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE23⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2792 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2096 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE25⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1844 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4668 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE27⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:892 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3984 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE29⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2788 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4428 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE31⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1768 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1732 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE33⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1712 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4856 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE35⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3708 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2144 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE37⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4808 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4436 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE39⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4292 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3736 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE41⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2832 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1236 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE43⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3556 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:60 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE45⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4568 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1796
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5f750aeee6ba230959de873427befda57
SHA1457ff5d34f5c49e6c49a038eb1b2e76dde91f3da
SHA2565daa46364839ea184b7ea01acb4b56837e0194620f13613a98a32a4f314c7e7b
SHA512a505df8a8f7bf6e02139f4f038593075e35b2887523b821e481d5eabcdc2e87831954eee632e28664193d155de8562463f00e11b7090bf3d220dfc9b9f2ecfeb