Analysis
-
max time kernel
42s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 07:43
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe
-
Size
232KB
-
MD5
985999993fffddc99fd1a4ea76759ff1
-
SHA1
39d023c4898cb8acd2725f91ff0969ff763aeafc
-
SHA256
68623f085d7f715b372067e01a38196402857560ebc617da8bf0c0be045ee2ab
-
SHA512
be21cdf001fad5d3000e7c76084cfd9385edf8ac3feb48d16b105db88b076365d51c5b6005d47b1e73f5be9ecd0157d6e054f1915985edbba7feecc1892b0d3b
-
SSDEEP
6144:dSSBgo/oaUevQfIiew0T6S3PzFHvusUjQ:dSEgWoaUeqcT6azxusU
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2424 igfxpcv32.exe -
Executes dropped EXE 12 IoCs
pid Process 2424 igfxpcv32.exe 2896 igfxpcv32.exe 2704 igfxpcv32.exe 2056 igfxpcv32.exe 2900 igfxpcv32.exe 1756 igfxpcv32.exe 2448 igfxpcv32.exe 836 igfxpcv32.exe 1972 igfxpcv32.exe 1924 igfxpcv32.exe 2184 igfxpcv32.exe 2340 igfxpcv32.exe -
Loads dropped DLL 24 IoCs
pid Process 2136 JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe 2136 JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe 2424 igfxpcv32.exe 2424 igfxpcv32.exe 2896 igfxpcv32.exe 2896 igfxpcv32.exe 2704 igfxpcv32.exe 2704 igfxpcv32.exe 2056 igfxpcv32.exe 2056 igfxpcv32.exe 2900 igfxpcv32.exe 2900 igfxpcv32.exe 1756 igfxpcv32.exe 1756 igfxpcv32.exe 2448 igfxpcv32.exe 2448 igfxpcv32.exe 836 igfxpcv32.exe 836 igfxpcv32.exe 1972 igfxpcv32.exe 1972 igfxpcv32.exe 1924 igfxpcv32.exe 1924 igfxpcv32.exe 2184 igfxpcv32.exe 2184 igfxpcv32.exe -
Maps connected drives based on registry 3 TTPs 26 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe -
Drops file in System32 directory 39 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2136 JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe 2136 JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe 2136 JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe 2136 JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe 2136 JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe 2136 JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe 2136 JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe 2136 JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe 2136 JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe 2136 JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe 2136 JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe 2136 JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe 2136 JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe 2136 JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe 2136 JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe 2136 JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe 2424 igfxpcv32.exe 2424 igfxpcv32.exe 2424 igfxpcv32.exe 2424 igfxpcv32.exe 2424 igfxpcv32.exe 2424 igfxpcv32.exe 2424 igfxpcv32.exe 2424 igfxpcv32.exe 2424 igfxpcv32.exe 2424 igfxpcv32.exe 2424 igfxpcv32.exe 2424 igfxpcv32.exe 2424 igfxpcv32.exe 2424 igfxpcv32.exe 2424 igfxpcv32.exe 2424 igfxpcv32.exe 2896 igfxpcv32.exe 2896 igfxpcv32.exe 2896 igfxpcv32.exe 2896 igfxpcv32.exe 2896 igfxpcv32.exe 2896 igfxpcv32.exe 2896 igfxpcv32.exe 2896 igfxpcv32.exe 2896 igfxpcv32.exe 2896 igfxpcv32.exe 2896 igfxpcv32.exe 2896 igfxpcv32.exe 2896 igfxpcv32.exe 2896 igfxpcv32.exe 2896 igfxpcv32.exe 2896 igfxpcv32.exe 2704 igfxpcv32.exe 2704 igfxpcv32.exe 2704 igfxpcv32.exe 2704 igfxpcv32.exe 2704 igfxpcv32.exe 2704 igfxpcv32.exe 2704 igfxpcv32.exe 2704 igfxpcv32.exe 2704 igfxpcv32.exe 2704 igfxpcv32.exe 2704 igfxpcv32.exe 2704 igfxpcv32.exe 2704 igfxpcv32.exe 2704 igfxpcv32.exe 2704 igfxpcv32.exe 2704 igfxpcv32.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2424 2136 JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe 31 PID 2136 wrote to memory of 2424 2136 JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe 31 PID 2136 wrote to memory of 2424 2136 JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe 31 PID 2136 wrote to memory of 2424 2136 JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe 31 PID 2424 wrote to memory of 2896 2424 igfxpcv32.exe 32 PID 2424 wrote to memory of 2896 2424 igfxpcv32.exe 32 PID 2424 wrote to memory of 2896 2424 igfxpcv32.exe 32 PID 2424 wrote to memory of 2896 2424 igfxpcv32.exe 32 PID 2896 wrote to memory of 2704 2896 igfxpcv32.exe 33 PID 2896 wrote to memory of 2704 2896 igfxpcv32.exe 33 PID 2896 wrote to memory of 2704 2896 igfxpcv32.exe 33 PID 2896 wrote to memory of 2704 2896 igfxpcv32.exe 33 PID 2704 wrote to memory of 2056 2704 igfxpcv32.exe 34 PID 2704 wrote to memory of 2056 2704 igfxpcv32.exe 34 PID 2704 wrote to memory of 2056 2704 igfxpcv32.exe 34 PID 2704 wrote to memory of 2056 2704 igfxpcv32.exe 34 PID 2056 wrote to memory of 2900 2056 igfxpcv32.exe 35 PID 2056 wrote to memory of 2900 2056 igfxpcv32.exe 35 PID 2056 wrote to memory of 2900 2056 igfxpcv32.exe 35 PID 2056 wrote to memory of 2900 2056 igfxpcv32.exe 35 PID 2900 wrote to memory of 1756 2900 igfxpcv32.exe 36 PID 2900 wrote to memory of 1756 2900 igfxpcv32.exe 36 PID 2900 wrote to memory of 1756 2900 igfxpcv32.exe 36 PID 2900 wrote to memory of 1756 2900 igfxpcv32.exe 36 PID 1756 wrote to memory of 2448 1756 igfxpcv32.exe 37 PID 1756 wrote to memory of 2448 1756 igfxpcv32.exe 37 PID 1756 wrote to memory of 2448 1756 igfxpcv32.exe 37 PID 1756 wrote to memory of 2448 1756 igfxpcv32.exe 37 PID 2448 wrote to memory of 836 2448 igfxpcv32.exe 38 PID 2448 wrote to memory of 836 2448 igfxpcv32.exe 38 PID 2448 wrote to memory of 836 2448 igfxpcv32.exe 38 PID 2448 wrote to memory of 836 2448 igfxpcv32.exe 38 PID 836 wrote to memory of 1972 836 igfxpcv32.exe 39 PID 836 wrote to memory of 1972 836 igfxpcv32.exe 39 PID 836 wrote to memory of 1972 836 igfxpcv32.exe 39 PID 836 wrote to memory of 1972 836 igfxpcv32.exe 39 PID 1972 wrote to memory of 1924 1972 igfxpcv32.exe 40 PID 1972 wrote to memory of 1924 1972 igfxpcv32.exe 40 PID 1972 wrote to memory of 1924 1972 igfxpcv32.exe 40 PID 1972 wrote to memory of 1924 1972 igfxpcv32.exe 40 PID 1924 wrote to memory of 2184 1924 igfxpcv32.exe 41 PID 1924 wrote to memory of 2184 1924 igfxpcv32.exe 41 PID 1924 wrote to memory of 2184 1924 igfxpcv32.exe 41 PID 1924 wrote to memory of 2184 1924 igfxpcv32.exe 41 PID 2184 wrote to memory of 2340 2184 igfxpcv32.exe 42 PID 2184 wrote to memory of 2340 2184 igfxpcv32.exe 42 PID 2184 wrote to memory of 2340 2184 igfxpcv32.exe 42 PID 2184 wrote to memory of 2340 2184 igfxpcv32.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_985999993fffddc99fd1a4ea76759ff1.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE13⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2340 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE14⤵PID:2856
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE15⤵PID:1788
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE16⤵PID:2200
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE17⤵PID:2960
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE18⤵PID:2696
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE19⤵PID:2292
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE20⤵PID:1616
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE21⤵PID:2448
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE22⤵PID:896
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE23⤵PID:1556
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE24⤵PID:2400
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE25⤵PID:1580
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE26⤵PID:2392
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE27⤵PID:2860
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE28⤵PID:2896
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE29⤵PID:1236
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE30⤵PID:1932
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE31⤵PID:2964
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE32⤵PID:2276
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE33⤵PID:1076
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE34⤵PID:2456
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE35⤵PID:2448
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE36⤵PID:1668
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE37⤵PID:1744
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE38⤵PID:1924
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE39⤵PID:1088
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE40⤵PID:2756
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE41⤵PID:2620
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE42⤵PID:1928
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE43⤵PID:1976
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE44⤵PID:1980
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE45⤵PID:2232
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE46⤵PID:2252
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE47⤵PID:696
-
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE48⤵PID:1604
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD5985999993fffddc99fd1a4ea76759ff1
SHA139d023c4898cb8acd2725f91ff0969ff763aeafc
SHA25668623f085d7f715b372067e01a38196402857560ebc617da8bf0c0be045ee2ab
SHA512be21cdf001fad5d3000e7c76084cfd9385edf8ac3feb48d16b105db88b076365d51c5b6005d47b1e73f5be9ecd0157d6e054f1915985edbba7feecc1892b0d3b