Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 19:40
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe
-
Size
281KB
-
MD5
955b74dfb09b447254f29aab492ce709
-
SHA1
46e98f0ea9e3274ec3411c7550edcbcf9d99039e
-
SHA256
d6c785ddd37a6cb6c0d6cbdd3dea85bb58e14c21e6969891bcf32c66a601c1be
-
SHA512
2d52a9824c9bf3eaeb666e70df2a2f4029a55765bcfdc27dde8067afc22747f7f40a0c5c63d5b45f3e0b7298e45a14eefcce795f4448986fa6bfcee4eb782677
-
SSDEEP
6144:Hb30Xv5Mq6KhWOqjn2yDwsTA6FdcP2ovWZ3jmodsFljac:Hq5ZVWOqjnpDdAedM7v+hdklja
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2844 igfxdmv32.exe -
Executes dropped EXE 51 IoCs
pid Process 2844 igfxdmv32.exe 3048 igfxdmv32.exe 1012 igfxdmv32.exe 2888 igfxdmv32.exe 2180 igfxdmv32.exe 2320 igfxdmv32.exe 1108 igfxdmv32.exe 2032 igfxdmv32.exe 2024 igfxdmv32.exe 2184 igfxdmv32.exe 1864 igfxdmv32.exe 1556 igfxdmv32.exe 916 igfxdmv32.exe 1624 igfxdmv32.exe 956 igfxdmv32.exe 1636 igfxdmv32.exe 2944 igfxdmv32.exe 288 igfxdmv32.exe 1412 igfxdmv32.exe 2308 igfxdmv32.exe 2672 igfxdmv32.exe 2872 igfxdmv32.exe 2808 igfxdmv32.exe 796 igfxdmv32.exe 1984 igfxdmv32.exe 2968 igfxdmv32.exe 1840 igfxdmv32.exe 644 igfxdmv32.exe 1232 igfxdmv32.exe 2320 igfxdmv32.exe 2784 igfxdmv32.exe 2756 igfxdmv32.exe 2216 igfxdmv32.exe 2268 igfxdmv32.exe 2936 igfxdmv32.exe 236 igfxdmv32.exe 3052 igfxdmv32.exe 1736 igfxdmv32.exe 736 igfxdmv32.exe 1540 igfxdmv32.exe 2972 igfxdmv32.exe 2348 igfxdmv32.exe 2328 igfxdmv32.exe 3024 igfxdmv32.exe 336 igfxdmv32.exe 2652 igfxdmv32.exe 2908 igfxdmv32.exe 2552 igfxdmv32.exe 2628 igfxdmv32.exe 264 igfxdmv32.exe 2584 igfxdmv32.exe -
Loads dropped DLL 64 IoCs
pid Process 2916 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 2916 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 2844 igfxdmv32.exe 2844 igfxdmv32.exe 3048 igfxdmv32.exe 3048 igfxdmv32.exe 1012 igfxdmv32.exe 1012 igfxdmv32.exe 2888 igfxdmv32.exe 2888 igfxdmv32.exe 2180 igfxdmv32.exe 2180 igfxdmv32.exe 2320 igfxdmv32.exe 2320 igfxdmv32.exe 1108 igfxdmv32.exe 1108 igfxdmv32.exe 2032 igfxdmv32.exe 2032 igfxdmv32.exe 2024 igfxdmv32.exe 2024 igfxdmv32.exe 2184 igfxdmv32.exe 2184 igfxdmv32.exe 1864 igfxdmv32.exe 1864 igfxdmv32.exe 1556 igfxdmv32.exe 1556 igfxdmv32.exe 916 igfxdmv32.exe 916 igfxdmv32.exe 1624 igfxdmv32.exe 1624 igfxdmv32.exe 956 igfxdmv32.exe 956 igfxdmv32.exe 1636 igfxdmv32.exe 1636 igfxdmv32.exe 2944 igfxdmv32.exe 2944 igfxdmv32.exe 288 igfxdmv32.exe 288 igfxdmv32.exe 1412 igfxdmv32.exe 1412 igfxdmv32.exe 2308 igfxdmv32.exe 2308 igfxdmv32.exe 2672 igfxdmv32.exe 2672 igfxdmv32.exe 2872 igfxdmv32.exe 2872 igfxdmv32.exe 2808 igfxdmv32.exe 2808 igfxdmv32.exe 796 igfxdmv32.exe 796 igfxdmv32.exe 1984 igfxdmv32.exe 1984 igfxdmv32.exe 2968 igfxdmv32.exe 2968 igfxdmv32.exe 1840 igfxdmv32.exe 1840 igfxdmv32.exe 644 igfxdmv32.exe 644 igfxdmv32.exe 1232 igfxdmv32.exe 1232 igfxdmv32.exe 2320 igfxdmv32.exe 2320 igfxdmv32.exe 2784 igfxdmv32.exe 2784 igfxdmv32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmv32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 52 IoCs
pid Process 2916 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 2844 igfxdmv32.exe 3048 igfxdmv32.exe 1012 igfxdmv32.exe 2888 igfxdmv32.exe 2180 igfxdmv32.exe 2320 igfxdmv32.exe 1108 igfxdmv32.exe 2032 igfxdmv32.exe 2024 igfxdmv32.exe 2184 igfxdmv32.exe 1864 igfxdmv32.exe 1556 igfxdmv32.exe 916 igfxdmv32.exe 1624 igfxdmv32.exe 956 igfxdmv32.exe 1636 igfxdmv32.exe 2944 igfxdmv32.exe 288 igfxdmv32.exe 1412 igfxdmv32.exe 2308 igfxdmv32.exe 2672 igfxdmv32.exe 2872 igfxdmv32.exe 2808 igfxdmv32.exe 796 igfxdmv32.exe 1984 igfxdmv32.exe 2968 igfxdmv32.exe 1840 igfxdmv32.exe 644 igfxdmv32.exe 1232 igfxdmv32.exe 2320 igfxdmv32.exe 2784 igfxdmv32.exe 2756 igfxdmv32.exe 2216 igfxdmv32.exe 2268 igfxdmv32.exe 2936 igfxdmv32.exe 236 igfxdmv32.exe 3052 igfxdmv32.exe 1736 igfxdmv32.exe 736 igfxdmv32.exe 1540 igfxdmv32.exe 2972 igfxdmv32.exe 2348 igfxdmv32.exe 2328 igfxdmv32.exe 3024 igfxdmv32.exe 336 igfxdmv32.exe 2652 igfxdmv32.exe 2908 igfxdmv32.exe 2552 igfxdmv32.exe 2628 igfxdmv32.exe 264 igfxdmv32.exe 2584 igfxdmv32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 51 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2916 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 2916 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 2916 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 2916 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 2916 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 2916 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 2916 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 2916 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 2916 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 2916 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 2916 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 2916 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 2916 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 2916 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 2916 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 2916 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 2844 igfxdmv32.exe 2844 igfxdmv32.exe 2844 igfxdmv32.exe 2844 igfxdmv32.exe 2844 igfxdmv32.exe 2844 igfxdmv32.exe 2844 igfxdmv32.exe 2844 igfxdmv32.exe 2844 igfxdmv32.exe 2844 igfxdmv32.exe 2844 igfxdmv32.exe 2844 igfxdmv32.exe 2844 igfxdmv32.exe 2844 igfxdmv32.exe 2844 igfxdmv32.exe 2844 igfxdmv32.exe 3048 igfxdmv32.exe 3048 igfxdmv32.exe 3048 igfxdmv32.exe 3048 igfxdmv32.exe 3048 igfxdmv32.exe 3048 igfxdmv32.exe 3048 igfxdmv32.exe 3048 igfxdmv32.exe 3048 igfxdmv32.exe 3048 igfxdmv32.exe 3048 igfxdmv32.exe 3048 igfxdmv32.exe 3048 igfxdmv32.exe 3048 igfxdmv32.exe 3048 igfxdmv32.exe 3048 igfxdmv32.exe 1012 igfxdmv32.exe 1012 igfxdmv32.exe 1012 igfxdmv32.exe 1012 igfxdmv32.exe 1012 igfxdmv32.exe 1012 igfxdmv32.exe 1012 igfxdmv32.exe 1012 igfxdmv32.exe 1012 igfxdmv32.exe 1012 igfxdmv32.exe 1012 igfxdmv32.exe 1012 igfxdmv32.exe 1012 igfxdmv32.exe 1012 igfxdmv32.exe 1012 igfxdmv32.exe 1012 igfxdmv32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2844 2916 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 30 PID 2916 wrote to memory of 2844 2916 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 30 PID 2916 wrote to memory of 2844 2916 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 30 PID 2916 wrote to memory of 2844 2916 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 30 PID 2844 wrote to memory of 3048 2844 igfxdmv32.exe 31 PID 2844 wrote to memory of 3048 2844 igfxdmv32.exe 31 PID 2844 wrote to memory of 3048 2844 igfxdmv32.exe 31 PID 2844 wrote to memory of 3048 2844 igfxdmv32.exe 31 PID 3048 wrote to memory of 1012 3048 igfxdmv32.exe 32 PID 3048 wrote to memory of 1012 3048 igfxdmv32.exe 32 PID 3048 wrote to memory of 1012 3048 igfxdmv32.exe 32 PID 3048 wrote to memory of 1012 3048 igfxdmv32.exe 32 PID 1012 wrote to memory of 2888 1012 igfxdmv32.exe 33 PID 1012 wrote to memory of 2888 1012 igfxdmv32.exe 33 PID 1012 wrote to memory of 2888 1012 igfxdmv32.exe 33 PID 1012 wrote to memory of 2888 1012 igfxdmv32.exe 33 PID 2888 wrote to memory of 2180 2888 igfxdmv32.exe 34 PID 2888 wrote to memory of 2180 2888 igfxdmv32.exe 34 PID 2888 wrote to memory of 2180 2888 igfxdmv32.exe 34 PID 2888 wrote to memory of 2180 2888 igfxdmv32.exe 34 PID 2180 wrote to memory of 2320 2180 igfxdmv32.exe 35 PID 2180 wrote to memory of 2320 2180 igfxdmv32.exe 35 PID 2180 wrote to memory of 2320 2180 igfxdmv32.exe 35 PID 2180 wrote to memory of 2320 2180 igfxdmv32.exe 35 PID 2320 wrote to memory of 1108 2320 igfxdmv32.exe 36 PID 2320 wrote to memory of 1108 2320 igfxdmv32.exe 36 PID 2320 wrote to memory of 1108 2320 igfxdmv32.exe 36 PID 2320 wrote to memory of 1108 2320 igfxdmv32.exe 36 PID 1108 wrote to memory of 2032 1108 igfxdmv32.exe 37 PID 1108 wrote to memory of 2032 1108 igfxdmv32.exe 37 PID 1108 wrote to memory of 2032 1108 igfxdmv32.exe 37 PID 1108 wrote to memory of 2032 1108 igfxdmv32.exe 37 PID 2032 wrote to memory of 2024 2032 igfxdmv32.exe 38 PID 2032 wrote to memory of 2024 2032 igfxdmv32.exe 38 PID 2032 wrote to memory of 2024 2032 igfxdmv32.exe 38 PID 2032 wrote to memory of 2024 2032 igfxdmv32.exe 38 PID 2024 wrote to memory of 2184 2024 igfxdmv32.exe 40 PID 2024 wrote to memory of 2184 2024 igfxdmv32.exe 40 PID 2024 wrote to memory of 2184 2024 igfxdmv32.exe 40 PID 2024 wrote to memory of 2184 2024 igfxdmv32.exe 40 PID 2184 wrote to memory of 1864 2184 igfxdmv32.exe 41 PID 2184 wrote to memory of 1864 2184 igfxdmv32.exe 41 PID 2184 wrote to memory of 1864 2184 igfxdmv32.exe 41 PID 2184 wrote to memory of 1864 2184 igfxdmv32.exe 41 PID 1864 wrote to memory of 1556 1864 igfxdmv32.exe 42 PID 1864 wrote to memory of 1556 1864 igfxdmv32.exe 42 PID 1864 wrote to memory of 1556 1864 igfxdmv32.exe 42 PID 1864 wrote to memory of 1556 1864 igfxdmv32.exe 42 PID 1556 wrote to memory of 916 1556 igfxdmv32.exe 43 PID 1556 wrote to memory of 916 1556 igfxdmv32.exe 43 PID 1556 wrote to memory of 916 1556 igfxdmv32.exe 43 PID 1556 wrote to memory of 916 1556 igfxdmv32.exe 43 PID 916 wrote to memory of 1624 916 igfxdmv32.exe 44 PID 916 wrote to memory of 1624 916 igfxdmv32.exe 44 PID 916 wrote to memory of 1624 916 igfxdmv32.exe 44 PID 916 wrote to memory of 1624 916 igfxdmv32.exe 44 PID 1624 wrote to memory of 956 1624 igfxdmv32.exe 45 PID 1624 wrote to memory of 956 1624 igfxdmv32.exe 45 PID 1624 wrote to memory of 956 1624 igfxdmv32.exe 45 PID 1624 wrote to memory of 956 1624 igfxdmv32.exe 45 PID 956 wrote to memory of 1636 956 igfxdmv32.exe 46 PID 956 wrote to memory of 1636 956 igfxdmv32.exe 46 PID 956 wrote to memory of 1636 956 igfxdmv32.exe 46 PID 956 wrote to memory of 1636 956 igfxdmv32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1636 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2944 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:288 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1412 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2308 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2672 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2872 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2808 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:796 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1984 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1840 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:644 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1232 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2320 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2784 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2756 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2216 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2268 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2936 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:236 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3052 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1736 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:736 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE41⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1540 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2972 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2348 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2328 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3024 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE46⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:336 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2652 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2908 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE49⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2552 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE50⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2628 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE51⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:264 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE52⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2584
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
281KB
MD5955b74dfb09b447254f29aab492ce709
SHA146e98f0ea9e3274ec3411c7550edcbcf9d99039e
SHA256d6c785ddd37a6cb6c0d6cbdd3dea85bb58e14c21e6969891bcf32c66a601c1be
SHA5122d52a9824c9bf3eaeb666e70df2a2f4029a55765bcfdc27dde8067afc22747f7f40a0c5c63d5b45f3e0b7298e45a14eefcce795f4448986fa6bfcee4eb782677