Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 17:42
Behavioral task
behavioral1
Sample
fc833bf26a3c90f319a7f29a3ee54ac7_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fc833bf26a3c90f319a7f29a3ee54ac7_JaffaCakes118.exe
-
Size
198KB
-
MD5
fc833bf26a3c90f319a7f29a3ee54ac7
-
SHA1
26ee0ff687d7fd4521a1ea7f0d8e46c490b8718c
-
SHA256
7911cf03da7ba98c98d76730441c378a32daa0f12f7ba8b121d0db9ccf4920b3
-
SHA512
91ad98fea6765608a7350ee6e1cbfcb1ca9cd8851d2d3810cc2d3d910e04e4723783a67e4bb7a596c7e7ea96c8d5aa334ab67984b8424ad76854135c76198aba
-
SSDEEP
6144:QjWq7chPrO02BNnqLqoHMkrxX87Ltgg6ab/5:QjN+jO1BNnqLlt5itggBT5
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 3008 igfxdkp32.exe -
Executes dropped EXE 46 IoCs
pid Process 3008 igfxdkp32.exe 2680 igfxdkp32.exe 2620 igfxdkp32.exe 2528 igfxdkp32.exe 1852 igfxdkp32.exe 1876 igfxdkp32.exe 856 igfxdkp32.exe 1020 igfxdkp32.exe 1760 igfxdkp32.exe 2804 igfxdkp32.exe 2872 igfxdkp32.exe 1996 igfxdkp32.exe 1752 igfxdkp32.exe 1948 igfxdkp32.exe 1628 igfxdkp32.exe 2068 igfxdkp32.exe 3060 igfxdkp32.exe 316 igfxdkp32.exe 1512 igfxdkp32.exe 2972 igfxdkp32.exe 1776 igfxdkp32.exe 2640 igfxdkp32.exe 2560 igfxdkp32.exe 2712 igfxdkp32.exe 2552 igfxdkp32.exe 2988 igfxdkp32.exe 2060 igfxdkp32.exe 1964 igfxdkp32.exe 1076 igfxdkp32.exe 2840 igfxdkp32.exe 2812 igfxdkp32.exe 832 igfxdkp32.exe 1456 igfxdkp32.exe 412 igfxdkp32.exe 2516 igfxdkp32.exe 324 igfxdkp32.exe 2356 igfxdkp32.exe 1844 igfxdkp32.exe 1316 igfxdkp32.exe 596 igfxdkp32.exe 880 igfxdkp32.exe 1528 igfxdkp32.exe 1656 igfxdkp32.exe 1512 igfxdkp32.exe 800 igfxdkp32.exe 2764 igfxdkp32.exe -
Loads dropped DLL 64 IoCs
pid Process 2336 fc833bf26a3c90f319a7f29a3ee54ac7_JaffaCakes118.exe 2336 fc833bf26a3c90f319a7f29a3ee54ac7_JaffaCakes118.exe 3008 igfxdkp32.exe 3008 igfxdkp32.exe 2680 igfxdkp32.exe 2680 igfxdkp32.exe 2620 igfxdkp32.exe 2620 igfxdkp32.exe 2528 igfxdkp32.exe 2528 igfxdkp32.exe 1852 igfxdkp32.exe 1852 igfxdkp32.exe 1876 igfxdkp32.exe 1876 igfxdkp32.exe 856 igfxdkp32.exe 856 igfxdkp32.exe 1020 igfxdkp32.exe 1020 igfxdkp32.exe 1760 igfxdkp32.exe 1760 igfxdkp32.exe 2804 igfxdkp32.exe 2804 igfxdkp32.exe 2872 igfxdkp32.exe 2872 igfxdkp32.exe 1996 igfxdkp32.exe 1996 igfxdkp32.exe 1752 igfxdkp32.exe 1752 igfxdkp32.exe 1948 igfxdkp32.exe 1948 igfxdkp32.exe 1628 igfxdkp32.exe 1628 igfxdkp32.exe 2068 igfxdkp32.exe 2068 igfxdkp32.exe 3060 igfxdkp32.exe 3060 igfxdkp32.exe 316 igfxdkp32.exe 316 igfxdkp32.exe 1512 igfxdkp32.exe 1512 igfxdkp32.exe 2972 igfxdkp32.exe 2972 igfxdkp32.exe 1776 igfxdkp32.exe 1776 igfxdkp32.exe 2640 igfxdkp32.exe 2640 igfxdkp32.exe 2560 igfxdkp32.exe 2560 igfxdkp32.exe 2712 igfxdkp32.exe 2712 igfxdkp32.exe 2552 igfxdkp32.exe 2552 igfxdkp32.exe 2988 igfxdkp32.exe 2988 igfxdkp32.exe 2060 igfxdkp32.exe 2060 igfxdkp32.exe 1964 igfxdkp32.exe 1964 igfxdkp32.exe 1076 igfxdkp32.exe 1076 igfxdkp32.exe 2840 igfxdkp32.exe 2840 igfxdkp32.exe 2812 igfxdkp32.exe 2812 igfxdkp32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 fc833bf26a3c90f319a7f29a3ee54ac7_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkp32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File created C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkp32.exe File created C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File created C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File created C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkp32.exe File created C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File created C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File created C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File created C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File created C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File created C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File created C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkp32.exe File created C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File created C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File created C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File created C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File created C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File created C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File created C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File created C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File created C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File created C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkp32.exe File created C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkp32.exe File created C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File created C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkp32.exe File created C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File created C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\igfxdkp32.exe igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkp32.exe -
resource yara_rule behavioral1/memory/2336-0-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2336-2-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/files/0x000e00000001434d-6.dat upx behavioral1/memory/2336-17-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/3008-15-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/3008-25-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2680-23-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2680-30-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2620-35-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2528-40-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1852-41-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1876-46-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1852-48-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1876-54-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/856-53-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/856-59-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1020-64-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1760-65-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1760-72-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2804-78-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2872-79-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2872-85-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1996-91-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1752-97-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1628-105-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1948-104-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1628-110-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2068-117-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/3060-115-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/3060-121-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/316-123-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1512-124-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1512-126-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2972-128-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1776-131-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2640-133-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2560-134-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2560-136-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2552-139-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2712-138-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2552-140-0x00000000032D0000-0x0000000003352000-memory.dmp upx behavioral1/memory/2552-142-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2988-144-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1964-147-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2060-146-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1964-149-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2060-150-0x0000000003780000-0x0000000003802000-memory.dmp upx behavioral1/memory/2840-153-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1076-152-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2812-156-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2840-155-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2812-158-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2840-159-0x0000000003320000-0x00000000033A2000-memory.dmp upx behavioral1/memory/832-161-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1456-162-0x00000000035C0000-0x0000000003642000-memory.dmp upx behavioral1/memory/1456-164-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/412-166-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/324-169-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2516-168-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/324-171-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1844-173-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2356-172-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1844-176-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2356-174-0x0000000000400000-0x0000000000482000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 47 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc833bf26a3c90f319a7f29a3ee54ac7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkp32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2336 fc833bf26a3c90f319a7f29a3ee54ac7_JaffaCakes118.exe 2336 fc833bf26a3c90f319a7f29a3ee54ac7_JaffaCakes118.exe 3008 igfxdkp32.exe 3008 igfxdkp32.exe 2680 igfxdkp32.exe 2680 igfxdkp32.exe 2620 igfxdkp32.exe 2620 igfxdkp32.exe 2528 igfxdkp32.exe 2528 igfxdkp32.exe 1852 igfxdkp32.exe 1852 igfxdkp32.exe 1876 igfxdkp32.exe 1876 igfxdkp32.exe 856 igfxdkp32.exe 856 igfxdkp32.exe 1020 igfxdkp32.exe 1020 igfxdkp32.exe 1760 igfxdkp32.exe 1760 igfxdkp32.exe 2804 igfxdkp32.exe 2804 igfxdkp32.exe 2872 igfxdkp32.exe 2872 igfxdkp32.exe 1996 igfxdkp32.exe 1996 igfxdkp32.exe 1752 igfxdkp32.exe 1752 igfxdkp32.exe 1948 igfxdkp32.exe 1948 igfxdkp32.exe 1628 igfxdkp32.exe 1628 igfxdkp32.exe 2068 igfxdkp32.exe 2068 igfxdkp32.exe 3060 igfxdkp32.exe 3060 igfxdkp32.exe 316 igfxdkp32.exe 316 igfxdkp32.exe 1512 igfxdkp32.exe 1512 igfxdkp32.exe 2972 igfxdkp32.exe 2972 igfxdkp32.exe 1776 igfxdkp32.exe 1776 igfxdkp32.exe 2640 igfxdkp32.exe 2640 igfxdkp32.exe 2560 igfxdkp32.exe 2560 igfxdkp32.exe 2712 igfxdkp32.exe 2712 igfxdkp32.exe 2552 igfxdkp32.exe 2552 igfxdkp32.exe 2988 igfxdkp32.exe 2988 igfxdkp32.exe 2060 igfxdkp32.exe 2060 igfxdkp32.exe 1964 igfxdkp32.exe 1964 igfxdkp32.exe 1076 igfxdkp32.exe 1076 igfxdkp32.exe 2840 igfxdkp32.exe 2840 igfxdkp32.exe 2812 igfxdkp32.exe 2812 igfxdkp32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2336 wrote to memory of 3008 2336 fc833bf26a3c90f319a7f29a3ee54ac7_JaffaCakes118.exe 31 PID 2336 wrote to memory of 3008 2336 fc833bf26a3c90f319a7f29a3ee54ac7_JaffaCakes118.exe 31 PID 2336 wrote to memory of 3008 2336 fc833bf26a3c90f319a7f29a3ee54ac7_JaffaCakes118.exe 31 PID 2336 wrote to memory of 3008 2336 fc833bf26a3c90f319a7f29a3ee54ac7_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2680 3008 igfxdkp32.exe 32 PID 3008 wrote to memory of 2680 3008 igfxdkp32.exe 32 PID 3008 wrote to memory of 2680 3008 igfxdkp32.exe 32 PID 3008 wrote to memory of 2680 3008 igfxdkp32.exe 32 PID 2680 wrote to memory of 2620 2680 igfxdkp32.exe 33 PID 2680 wrote to memory of 2620 2680 igfxdkp32.exe 33 PID 2680 wrote to memory of 2620 2680 igfxdkp32.exe 33 PID 2680 wrote to memory of 2620 2680 igfxdkp32.exe 33 PID 2620 wrote to memory of 2528 2620 igfxdkp32.exe 34 PID 2620 wrote to memory of 2528 2620 igfxdkp32.exe 34 PID 2620 wrote to memory of 2528 2620 igfxdkp32.exe 34 PID 2620 wrote to memory of 2528 2620 igfxdkp32.exe 34 PID 2528 wrote to memory of 1852 2528 igfxdkp32.exe 35 PID 2528 wrote to memory of 1852 2528 igfxdkp32.exe 35 PID 2528 wrote to memory of 1852 2528 igfxdkp32.exe 35 PID 2528 wrote to memory of 1852 2528 igfxdkp32.exe 35 PID 1852 wrote to memory of 1876 1852 igfxdkp32.exe 36 PID 1852 wrote to memory of 1876 1852 igfxdkp32.exe 36 PID 1852 wrote to memory of 1876 1852 igfxdkp32.exe 36 PID 1852 wrote to memory of 1876 1852 igfxdkp32.exe 36 PID 1876 wrote to memory of 856 1876 igfxdkp32.exe 37 PID 1876 wrote to memory of 856 1876 igfxdkp32.exe 37 PID 1876 wrote to memory of 856 1876 igfxdkp32.exe 37 PID 1876 wrote to memory of 856 1876 igfxdkp32.exe 37 PID 856 wrote to memory of 1020 856 igfxdkp32.exe 38 PID 856 wrote to memory of 1020 856 igfxdkp32.exe 38 PID 856 wrote to memory of 1020 856 igfxdkp32.exe 38 PID 856 wrote to memory of 1020 856 igfxdkp32.exe 38 PID 1020 wrote to memory of 1760 1020 igfxdkp32.exe 39 PID 1020 wrote to memory of 1760 1020 igfxdkp32.exe 39 PID 1020 wrote to memory of 1760 1020 igfxdkp32.exe 39 PID 1020 wrote to memory of 1760 1020 igfxdkp32.exe 39 PID 1760 wrote to memory of 2804 1760 igfxdkp32.exe 40 PID 1760 wrote to memory of 2804 1760 igfxdkp32.exe 40 PID 1760 wrote to memory of 2804 1760 igfxdkp32.exe 40 PID 1760 wrote to memory of 2804 1760 igfxdkp32.exe 40 PID 2804 wrote to memory of 2872 2804 igfxdkp32.exe 41 PID 2804 wrote to memory of 2872 2804 igfxdkp32.exe 41 PID 2804 wrote to memory of 2872 2804 igfxdkp32.exe 41 PID 2804 wrote to memory of 2872 2804 igfxdkp32.exe 41 PID 2872 wrote to memory of 1996 2872 igfxdkp32.exe 42 PID 2872 wrote to memory of 1996 2872 igfxdkp32.exe 42 PID 2872 wrote to memory of 1996 2872 igfxdkp32.exe 42 PID 2872 wrote to memory of 1996 2872 igfxdkp32.exe 42 PID 1996 wrote to memory of 1752 1996 igfxdkp32.exe 43 PID 1996 wrote to memory of 1752 1996 igfxdkp32.exe 43 PID 1996 wrote to memory of 1752 1996 igfxdkp32.exe 43 PID 1996 wrote to memory of 1752 1996 igfxdkp32.exe 43 PID 1752 wrote to memory of 1948 1752 igfxdkp32.exe 44 PID 1752 wrote to memory of 1948 1752 igfxdkp32.exe 44 PID 1752 wrote to memory of 1948 1752 igfxdkp32.exe 44 PID 1752 wrote to memory of 1948 1752 igfxdkp32.exe 44 PID 1948 wrote to memory of 1628 1948 igfxdkp32.exe 45 PID 1948 wrote to memory of 1628 1948 igfxdkp32.exe 45 PID 1948 wrote to memory of 1628 1948 igfxdkp32.exe 45 PID 1948 wrote to memory of 1628 1948 igfxdkp32.exe 45 PID 1628 wrote to memory of 2068 1628 igfxdkp32.exe 46 PID 1628 wrote to memory of 2068 1628 igfxdkp32.exe 46 PID 1628 wrote to memory of 2068 1628 igfxdkp32.exe 46 PID 1628 wrote to memory of 2068 1628 igfxdkp32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc833bf26a3c90f319a7f29a3ee54ac7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc833bf26a3c90f319a7f29a3ee54ac7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Users\Admin\AppData\Local\Temp\FC833B~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2068 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3060 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:316 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1512 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2972 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1776 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2640 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2560 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2712 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2552 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2988 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2060 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1964 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1076 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2840 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2812 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:832 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1456 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:412 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2516 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:324 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2356 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1844 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1316 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:596 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:880 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE43⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1528 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1656 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1512 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:800 -
C:\Windows\SysWOW64\igfxdkp32.exe"C:\Windows\system32\igfxdkp32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2764
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD5fc833bf26a3c90f319a7f29a3ee54ac7
SHA126ee0ff687d7fd4521a1ea7f0d8e46c490b8718c
SHA2567911cf03da7ba98c98d76730441c378a32daa0f12f7ba8b121d0db9ccf4920b3
SHA51291ad98fea6765608a7350ee6e1cbfcb1ca9cd8851d2d3810cc2d3d910e04e4723783a67e4bb7a596c7e7ea96c8d5aa334ab67984b8424ad76854135c76198aba