Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/12/2024, 13:52
Static task
static1
Behavioral task
behavioral1
Sample
fbcbe4a20ac9cd0567ba96dafa08129d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbcbe4a20ac9cd0567ba96dafa08129d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
fbcbe4a20ac9cd0567ba96dafa08129d_JaffaCakes118.exe
-
Size
163KB
-
MD5
fbcbe4a20ac9cd0567ba96dafa08129d
-
SHA1
191ff2231fc3070de345251e89d1f13ea035be4d
-
SHA256
4b3990375d2eec9f676836a2f46b9dcb1c55854c5ece97ec22218f246f1642b2
-
SHA512
ce393ed6a4a9218e7cc029a7bc1d0b965f29c5f3e643046092fa9f9a37fd8685db4c2ee0c1424b6828d925fe6f73d89a997762bfcdd2b996582ac97e3ef27392
-
SSDEEP
3072:k194BB9ZN91eRHm02Voe//OEG8OdmjUtk+Zg43:8ubj4RH2VotmQa9k
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 42 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation fbcbe4a20ac9cd0567ba96dafa08129d_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation igfxtc32.exe -
Deletes itself 1 IoCs
pid Process 4620 igfxtc32.exe -
Executes dropped EXE 42 IoCs
pid Process 4620 igfxtc32.exe 2380 igfxtc32.exe 2296 igfxtc32.exe 3656 igfxtc32.exe 4412 igfxtc32.exe 1576 igfxtc32.exe 3448 igfxtc32.exe 1588 igfxtc32.exe 4132 igfxtc32.exe 4068 igfxtc32.exe 620 igfxtc32.exe 880 igfxtc32.exe 4456 igfxtc32.exe 2768 igfxtc32.exe 2480 igfxtc32.exe 2052 igfxtc32.exe 4888 igfxtc32.exe 2332 igfxtc32.exe 1804 igfxtc32.exe 1380 igfxtc32.exe 4292 igfxtc32.exe 2948 igfxtc32.exe 4496 igfxtc32.exe 3640 igfxtc32.exe 1132 igfxtc32.exe 1912 igfxtc32.exe 828 igfxtc32.exe 3180 igfxtc32.exe 4464 igfxtc32.exe 4448 igfxtc32.exe 4304 igfxtc32.exe 2700 igfxtc32.exe 4600 igfxtc32.exe 4296 igfxtc32.exe 1044 igfxtc32.exe 5016 igfxtc32.exe 3432 igfxtc32.exe 2912 igfxtc32.exe 516 igfxtc32.exe 3836 igfxtc32.exe 3488 igfxtc32.exe 2844 igfxtc32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 fbcbe4a20ac9cd0567ba96dafa08129d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe fbcbe4a20ac9cd0567ba96dafa08129d_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxtc32.exe fbcbe4a20ac9cd0567ba96dafa08129d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 42 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbcbe4a20ac9cd0567ba96dafa08129d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtc32.exe -
Modifies registry class 42 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ fbcbe4a20ac9cd0567ba96dafa08129d_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3168 fbcbe4a20ac9cd0567ba96dafa08129d_JaffaCakes118.exe 3168 fbcbe4a20ac9cd0567ba96dafa08129d_JaffaCakes118.exe 3168 fbcbe4a20ac9cd0567ba96dafa08129d_JaffaCakes118.exe 3168 fbcbe4a20ac9cd0567ba96dafa08129d_JaffaCakes118.exe 4620 igfxtc32.exe 4620 igfxtc32.exe 4620 igfxtc32.exe 4620 igfxtc32.exe 2380 igfxtc32.exe 2380 igfxtc32.exe 2380 igfxtc32.exe 2380 igfxtc32.exe 2296 igfxtc32.exe 2296 igfxtc32.exe 2296 igfxtc32.exe 2296 igfxtc32.exe 3656 igfxtc32.exe 3656 igfxtc32.exe 3656 igfxtc32.exe 3656 igfxtc32.exe 4412 igfxtc32.exe 4412 igfxtc32.exe 4412 igfxtc32.exe 4412 igfxtc32.exe 1576 igfxtc32.exe 1576 igfxtc32.exe 1576 igfxtc32.exe 1576 igfxtc32.exe 3448 igfxtc32.exe 3448 igfxtc32.exe 3448 igfxtc32.exe 3448 igfxtc32.exe 1588 igfxtc32.exe 1588 igfxtc32.exe 1588 igfxtc32.exe 1588 igfxtc32.exe 4132 igfxtc32.exe 4132 igfxtc32.exe 4132 igfxtc32.exe 4132 igfxtc32.exe 4068 igfxtc32.exe 4068 igfxtc32.exe 4068 igfxtc32.exe 4068 igfxtc32.exe 620 igfxtc32.exe 620 igfxtc32.exe 620 igfxtc32.exe 620 igfxtc32.exe 880 igfxtc32.exe 880 igfxtc32.exe 880 igfxtc32.exe 880 igfxtc32.exe 4456 igfxtc32.exe 4456 igfxtc32.exe 4456 igfxtc32.exe 4456 igfxtc32.exe 2768 igfxtc32.exe 2768 igfxtc32.exe 2768 igfxtc32.exe 2768 igfxtc32.exe 2480 igfxtc32.exe 2480 igfxtc32.exe 2480 igfxtc32.exe 2480 igfxtc32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3168 wrote to memory of 4620 3168 fbcbe4a20ac9cd0567ba96dafa08129d_JaffaCakes118.exe 82 PID 3168 wrote to memory of 4620 3168 fbcbe4a20ac9cd0567ba96dafa08129d_JaffaCakes118.exe 82 PID 3168 wrote to memory of 4620 3168 fbcbe4a20ac9cd0567ba96dafa08129d_JaffaCakes118.exe 82 PID 4620 wrote to memory of 2380 4620 igfxtc32.exe 83 PID 4620 wrote to memory of 2380 4620 igfxtc32.exe 83 PID 4620 wrote to memory of 2380 4620 igfxtc32.exe 83 PID 2380 wrote to memory of 2296 2380 igfxtc32.exe 88 PID 2380 wrote to memory of 2296 2380 igfxtc32.exe 88 PID 2380 wrote to memory of 2296 2380 igfxtc32.exe 88 PID 2296 wrote to memory of 3656 2296 igfxtc32.exe 90 PID 2296 wrote to memory of 3656 2296 igfxtc32.exe 90 PID 2296 wrote to memory of 3656 2296 igfxtc32.exe 90 PID 3656 wrote to memory of 4412 3656 igfxtc32.exe 93 PID 3656 wrote to memory of 4412 3656 igfxtc32.exe 93 PID 3656 wrote to memory of 4412 3656 igfxtc32.exe 93 PID 4412 wrote to memory of 1576 4412 igfxtc32.exe 94 PID 4412 wrote to memory of 1576 4412 igfxtc32.exe 94 PID 4412 wrote to memory of 1576 4412 igfxtc32.exe 94 PID 1576 wrote to memory of 3448 1576 igfxtc32.exe 95 PID 1576 wrote to memory of 3448 1576 igfxtc32.exe 95 PID 1576 wrote to memory of 3448 1576 igfxtc32.exe 95 PID 3448 wrote to memory of 1588 3448 igfxtc32.exe 96 PID 3448 wrote to memory of 1588 3448 igfxtc32.exe 96 PID 3448 wrote to memory of 1588 3448 igfxtc32.exe 96 PID 1588 wrote to memory of 4132 1588 igfxtc32.exe 98 PID 1588 wrote to memory of 4132 1588 igfxtc32.exe 98 PID 1588 wrote to memory of 4132 1588 igfxtc32.exe 98 PID 4132 wrote to memory of 4068 4132 igfxtc32.exe 100 PID 4132 wrote to memory of 4068 4132 igfxtc32.exe 100 PID 4132 wrote to memory of 4068 4132 igfxtc32.exe 100 PID 4068 wrote to memory of 620 4068 igfxtc32.exe 101 PID 4068 wrote to memory of 620 4068 igfxtc32.exe 101 PID 4068 wrote to memory of 620 4068 igfxtc32.exe 101 PID 620 wrote to memory of 880 620 igfxtc32.exe 102 PID 620 wrote to memory of 880 620 igfxtc32.exe 102 PID 620 wrote to memory of 880 620 igfxtc32.exe 102 PID 880 wrote to memory of 4456 880 igfxtc32.exe 103 PID 880 wrote to memory of 4456 880 igfxtc32.exe 103 PID 880 wrote to memory of 4456 880 igfxtc32.exe 103 PID 4456 wrote to memory of 2768 4456 igfxtc32.exe 104 PID 4456 wrote to memory of 2768 4456 igfxtc32.exe 104 PID 4456 wrote to memory of 2768 4456 igfxtc32.exe 104 PID 2768 wrote to memory of 2480 2768 igfxtc32.exe 105 PID 2768 wrote to memory of 2480 2768 igfxtc32.exe 105 PID 2768 wrote to memory of 2480 2768 igfxtc32.exe 105 PID 2480 wrote to memory of 2052 2480 igfxtc32.exe 106 PID 2480 wrote to memory of 2052 2480 igfxtc32.exe 106 PID 2480 wrote to memory of 2052 2480 igfxtc32.exe 106 PID 2052 wrote to memory of 4888 2052 igfxtc32.exe 107 PID 2052 wrote to memory of 4888 2052 igfxtc32.exe 107 PID 2052 wrote to memory of 4888 2052 igfxtc32.exe 107 PID 4888 wrote to memory of 2332 4888 igfxtc32.exe 108 PID 4888 wrote to memory of 2332 4888 igfxtc32.exe 108 PID 4888 wrote to memory of 2332 4888 igfxtc32.exe 108 PID 2332 wrote to memory of 1804 2332 igfxtc32.exe 109 PID 2332 wrote to memory of 1804 2332 igfxtc32.exe 109 PID 2332 wrote to memory of 1804 2332 igfxtc32.exe 109 PID 1804 wrote to memory of 1380 1804 igfxtc32.exe 110 PID 1804 wrote to memory of 1380 1804 igfxtc32.exe 110 PID 1804 wrote to memory of 1380 1804 igfxtc32.exe 110 PID 1380 wrote to memory of 4292 1380 igfxtc32.exe 111 PID 1380 wrote to memory of 4292 1380 igfxtc32.exe 111 PID 1380 wrote to memory of 4292 1380 igfxtc32.exe 111 PID 4292 wrote to memory of 2948 4292 igfxtc32.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbcbe4a20ac9cd0567ba96dafa08129d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fbcbe4a20ac9cd0567ba96dafa08129d_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Users\Admin\AppData\Local\Temp\FBCBE4~1.EXE2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe9⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe13⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe17⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe21⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe23⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2948 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4496 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe25⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3640 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1132 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe27⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1912 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:828 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe29⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3180 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4464 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe31⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4448 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4304 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe33⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2700 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe34⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4600 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe35⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4296 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe36⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1044 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe37⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5016 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3432 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe39⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2912 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:516 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe41⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3836 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe42⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3488 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
PID:2844 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe44⤵PID:432
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
163KB
MD5fbcbe4a20ac9cd0567ba96dafa08129d
SHA1191ff2231fc3070de345251e89d1f13ea035be4d
SHA2564b3990375d2eec9f676836a2f46b9dcb1c55854c5ece97ec22218f246f1642b2
SHA512ce393ed6a4a9218e7cc029a7bc1d0b965f29c5f3e643046092fa9f9a37fd8685db4c2ee0c1424b6828d925fe6f73d89a997762bfcdd2b996582ac97e3ef27392