Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 17:06
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8adbc88e85dbe036a70626dfd16da4bf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8adbc88e85dbe036a70626dfd16da4bf.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_8adbc88e85dbe036a70626dfd16da4bf.exe
-
Size
254KB
-
MD5
8adbc88e85dbe036a70626dfd16da4bf
-
SHA1
640bf35d732b08a9e24b93be23b5075a67beecbc
-
SHA256
3b07e128ed2ebc9a373f09ff3fec29889d441e5b1af1a6c907424ebbf8c8415b
-
SHA512
5211850a71a0710da7650f308166c3d36c985f1ccf3c2bf7271e88e726fcc99c69bd8d0fbe4ae12bf6577896a3d6280c8e7cfc5851e24c32b448ef3228a1ebfe
-
SSDEEP
6144:jlo1JVAuafRj0jwbe91xrhwAwhBbxBjbnY+iIZVhBpDXNTl9:RWjW50sePduAwlBvnYJIZVv/l9
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 51 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation JaffaCakes118_8adbc88e85dbe036a70626dfd16da4bf.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdrv32.exe -
Deletes itself 1 IoCs
pid Process 3596 igfxdrv32.exe -
Executes dropped EXE 50 IoCs
pid Process 3596 igfxdrv32.exe 5788 igfxdrv32.exe 4976 igfxdrv32.exe 5416 igfxdrv32.exe 4080 igfxdrv32.exe 3316 igfxdrv32.exe 4480 igfxdrv32.exe 6072 igfxdrv32.exe 184 igfxdrv32.exe 3948 igfxdrv32.exe 3344 igfxdrv32.exe 876 igfxdrv32.exe 2004 igfxdrv32.exe 2052 igfxdrv32.exe 1264 igfxdrv32.exe 4012 igfxdrv32.exe 4512 igfxdrv32.exe 2376 igfxdrv32.exe 5040 igfxdrv32.exe 3516 igfxdrv32.exe 2076 igfxdrv32.exe 4580 igfxdrv32.exe 5256 igfxdrv32.exe 3596 igfxdrv32.exe 5492 igfxdrv32.exe 4852 igfxdrv32.exe 1652 igfxdrv32.exe 4684 igfxdrv32.exe 6084 igfxdrv32.exe 4720 igfxdrv32.exe 3144 igfxdrv32.exe 2756 igfxdrv32.exe 3952 igfxdrv32.exe 516 igfxdrv32.exe 4288 igfxdrv32.exe 3948 igfxdrv32.exe 1980 igfxdrv32.exe 4648 igfxdrv32.exe 1840 igfxdrv32.exe 5560 igfxdrv32.exe 4332 igfxdrv32.exe 5284 igfxdrv32.exe 2456 igfxdrv32.exe 876 igfxdrv32.exe 696 igfxdrv32.exe 6136 igfxdrv32.exe 3392 igfxdrv32.exe 3680 igfxdrv32.exe 5220 igfxdrv32.exe 1684 igfxdrv32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 JaffaCakes118_8adbc88e85dbe036a70626dfd16da4bf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum JaffaCakes118_8adbc88e85dbe036a70626dfd16da4bf.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdrv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdrv32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File created C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File created C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File created C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File created C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File created C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File created C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\igfxdrv32.exe JaffaCakes118_8adbc88e85dbe036a70626dfd16da4bf.exe File opened for modification C:\Windows\SysWOW64\ igfxdrv32.exe File created C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File created C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File created C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File created C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File created C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File created C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrv32.exe File created C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File created C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File created C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrv32.exe File created C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File created C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File created C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File created C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdrv32.exe File created C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe File created C:\Windows\SysWOW64\igfxdrv32.exe igfxdrv32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 51 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8adbc88e85dbe036a70626dfd16da4bf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdrv32.exe -
Modifies registry class 51 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ JaffaCakes118_8adbc88e85dbe036a70626dfd16da4bf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdrv32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2324 JaffaCakes118_8adbc88e85dbe036a70626dfd16da4bf.exe 2324 JaffaCakes118_8adbc88e85dbe036a70626dfd16da4bf.exe 3596 igfxdrv32.exe 3596 igfxdrv32.exe 5788 igfxdrv32.exe 5788 igfxdrv32.exe 4976 igfxdrv32.exe 4976 igfxdrv32.exe 5416 igfxdrv32.exe 5416 igfxdrv32.exe 4080 igfxdrv32.exe 4080 igfxdrv32.exe 3316 igfxdrv32.exe 3316 igfxdrv32.exe 4480 igfxdrv32.exe 4480 igfxdrv32.exe 6072 igfxdrv32.exe 6072 igfxdrv32.exe 184 igfxdrv32.exe 184 igfxdrv32.exe 3948 igfxdrv32.exe 3948 igfxdrv32.exe 3344 igfxdrv32.exe 3344 igfxdrv32.exe 876 igfxdrv32.exe 876 igfxdrv32.exe 2004 igfxdrv32.exe 2004 igfxdrv32.exe 2052 igfxdrv32.exe 2052 igfxdrv32.exe 1264 igfxdrv32.exe 1264 igfxdrv32.exe 4012 igfxdrv32.exe 4012 igfxdrv32.exe 4512 igfxdrv32.exe 4512 igfxdrv32.exe 2376 igfxdrv32.exe 2376 igfxdrv32.exe 5040 igfxdrv32.exe 5040 igfxdrv32.exe 3516 igfxdrv32.exe 3516 igfxdrv32.exe 2076 igfxdrv32.exe 2076 igfxdrv32.exe 4580 igfxdrv32.exe 4580 igfxdrv32.exe 5256 igfxdrv32.exe 5256 igfxdrv32.exe 3596 igfxdrv32.exe 3596 igfxdrv32.exe 5492 igfxdrv32.exe 5492 igfxdrv32.exe 4852 igfxdrv32.exe 4852 igfxdrv32.exe 1652 igfxdrv32.exe 1652 igfxdrv32.exe 4684 igfxdrv32.exe 4684 igfxdrv32.exe 6084 igfxdrv32.exe 6084 igfxdrv32.exe 4720 igfxdrv32.exe 4720 igfxdrv32.exe 3144 igfxdrv32.exe 3144 igfxdrv32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2324 wrote to memory of 3596 2324 JaffaCakes118_8adbc88e85dbe036a70626dfd16da4bf.exe 89 PID 2324 wrote to memory of 3596 2324 JaffaCakes118_8adbc88e85dbe036a70626dfd16da4bf.exe 89 PID 2324 wrote to memory of 3596 2324 JaffaCakes118_8adbc88e85dbe036a70626dfd16da4bf.exe 89 PID 3596 wrote to memory of 5788 3596 igfxdrv32.exe 94 PID 3596 wrote to memory of 5788 3596 igfxdrv32.exe 94 PID 3596 wrote to memory of 5788 3596 igfxdrv32.exe 94 PID 5788 wrote to memory of 4976 5788 igfxdrv32.exe 96 PID 5788 wrote to memory of 4976 5788 igfxdrv32.exe 96 PID 5788 wrote to memory of 4976 5788 igfxdrv32.exe 96 PID 4976 wrote to memory of 5416 4976 igfxdrv32.exe 98 PID 4976 wrote to memory of 5416 4976 igfxdrv32.exe 98 PID 4976 wrote to memory of 5416 4976 igfxdrv32.exe 98 PID 5416 wrote to memory of 4080 5416 igfxdrv32.exe 100 PID 5416 wrote to memory of 4080 5416 igfxdrv32.exe 100 PID 5416 wrote to memory of 4080 5416 igfxdrv32.exe 100 PID 4080 wrote to memory of 3316 4080 igfxdrv32.exe 101 PID 4080 wrote to memory of 3316 4080 igfxdrv32.exe 101 PID 4080 wrote to memory of 3316 4080 igfxdrv32.exe 101 PID 3316 wrote to memory of 4480 3316 igfxdrv32.exe 102 PID 3316 wrote to memory of 4480 3316 igfxdrv32.exe 102 PID 3316 wrote to memory of 4480 3316 igfxdrv32.exe 102 PID 4480 wrote to memory of 6072 4480 igfxdrv32.exe 103 PID 4480 wrote to memory of 6072 4480 igfxdrv32.exe 103 PID 4480 wrote to memory of 6072 4480 igfxdrv32.exe 103 PID 6072 wrote to memory of 184 6072 igfxdrv32.exe 104 PID 6072 wrote to memory of 184 6072 igfxdrv32.exe 104 PID 6072 wrote to memory of 184 6072 igfxdrv32.exe 104 PID 184 wrote to memory of 3948 184 igfxdrv32.exe 105 PID 184 wrote to memory of 3948 184 igfxdrv32.exe 105 PID 184 wrote to memory of 3948 184 igfxdrv32.exe 105 PID 3948 wrote to memory of 3344 3948 igfxdrv32.exe 107 PID 3948 wrote to memory of 3344 3948 igfxdrv32.exe 107 PID 3948 wrote to memory of 3344 3948 igfxdrv32.exe 107 PID 3344 wrote to memory of 876 3344 igfxdrv32.exe 109 PID 3344 wrote to memory of 876 3344 igfxdrv32.exe 109 PID 3344 wrote to memory of 876 3344 igfxdrv32.exe 109 PID 876 wrote to memory of 2004 876 igfxdrv32.exe 114 PID 876 wrote to memory of 2004 876 igfxdrv32.exe 114 PID 876 wrote to memory of 2004 876 igfxdrv32.exe 114 PID 2004 wrote to memory of 2052 2004 igfxdrv32.exe 117 PID 2004 wrote to memory of 2052 2004 igfxdrv32.exe 117 PID 2004 wrote to memory of 2052 2004 igfxdrv32.exe 117 PID 2052 wrote to memory of 1264 2052 igfxdrv32.exe 118 PID 2052 wrote to memory of 1264 2052 igfxdrv32.exe 118 PID 2052 wrote to memory of 1264 2052 igfxdrv32.exe 118 PID 1264 wrote to memory of 4012 1264 igfxdrv32.exe 119 PID 1264 wrote to memory of 4012 1264 igfxdrv32.exe 119 PID 1264 wrote to memory of 4012 1264 igfxdrv32.exe 119 PID 4012 wrote to memory of 4512 4012 igfxdrv32.exe 120 PID 4012 wrote to memory of 4512 4012 igfxdrv32.exe 120 PID 4012 wrote to memory of 4512 4012 igfxdrv32.exe 120 PID 4512 wrote to memory of 2376 4512 igfxdrv32.exe 121 PID 4512 wrote to memory of 2376 4512 igfxdrv32.exe 121 PID 4512 wrote to memory of 2376 4512 igfxdrv32.exe 121 PID 2376 wrote to memory of 5040 2376 igfxdrv32.exe 122 PID 2376 wrote to memory of 5040 2376 igfxdrv32.exe 122 PID 2376 wrote to memory of 5040 2376 igfxdrv32.exe 122 PID 5040 wrote to memory of 3516 5040 igfxdrv32.exe 123 PID 5040 wrote to memory of 3516 5040 igfxdrv32.exe 123 PID 5040 wrote to memory of 3516 5040 igfxdrv32.exe 123 PID 3516 wrote to memory of 2076 3516 igfxdrv32.exe 124 PID 3516 wrote to memory of 2076 3516 igfxdrv32.exe 124 PID 3516 wrote to memory of 2076 3516 igfxdrv32.exe 124 PID 2076 wrote to memory of 4580 2076 igfxdrv32.exe 125
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8adbc88e85dbe036a70626dfd16da4bf.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8adbc88e85dbe036a70626dfd16da4bf.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE3⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5788 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE5⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5416 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE7⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE9⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:6072 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:184 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE11⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE13⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE15⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE17⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE19⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE21⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE23⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4580 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5256 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE25⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3596 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5492 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE27⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4852 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1652 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE29⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4684 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:6084 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE31⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4720 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3144 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE33⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2756 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3952 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE35⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:516 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4288 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE37⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3948 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1980 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE39⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4648 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1840 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE41⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5560 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4332 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE43⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5284 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2456 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE45⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:876 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE46⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:696 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE47⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:6136 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3392 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE49⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3680 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5220 -
C:\Windows\SysWOW64\igfxdrv32.exe"C:\Windows\system32\igfxdrv32.exe" C:\Windows\SysWOW64\IGFXDR~1.EXE51⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1684
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD58adbc88e85dbe036a70626dfd16da4bf
SHA1640bf35d732b08a9e24b93be23b5075a67beecbc
SHA2563b07e128ed2ebc9a373f09ff3fec29889d441e5b1af1a6c907424ebbf8c8415b
SHA5125211850a71a0710da7650f308166c3d36c985f1ccf3c2bf7271e88e726fcc99c69bd8d0fbe4ae12bf6577896a3d6280c8e7cfc5851e24c32b448ef3228a1ebfe