Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 19:54
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe
-
Size
196KB
-
MD5
9910ca411dbe1e1847c3ace760992466
-
SHA1
d47a1d6173aa8118003f1bc6a7d65dbb1ba8593a
-
SHA256
0c85e687842116093c0804b2098c21a57fa383b0b97593c5d8eb9bf1491bd4bd
-
SHA512
a4b81a13b03354d03faa47499093c1180034ad76a404220d349f77573f87ff653f188cd9e02bfcd31ae1b0af671b31748d43a26f115e38ec150e2a28994aabf8
-
SSDEEP
6144:HDYRzSzx2g/bP7P3qwK7b3XkMyvBNKLV8bQQkV6+K:jYUz8mPzxK7zkLJNKLV8MQ60
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 1940 igfxdr86.exe -
Executes dropped EXE 50 IoCs
pid Process 1940 igfxdr86.exe 2744 igfxdr86.exe 344 igfxdr86.exe 1740 igfxdr86.exe 1960 igfxdr86.exe 2208 igfxdr86.exe 3044 igfxdr86.exe 1276 igfxdr86.exe 1480 igfxdr86.exe 1112 igfxdr86.exe 1600 igfxdr86.exe 2736 igfxdr86.exe 2332 igfxdr86.exe 2772 igfxdr86.exe 1856 igfxdr86.exe 1668 igfxdr86.exe 2308 igfxdr86.exe 2444 igfxdr86.exe 1864 igfxdr86.exe 2276 igfxdr86.exe 300 igfxdr86.exe 1480 igfxdr86.exe 2352 igfxdr86.exe 2888 igfxdr86.exe 2776 igfxdr86.exe 908 igfxdr86.exe 2940 igfxdr86.exe 2676 igfxdr86.exe 2968 igfxdr86.exe 2220 igfxdr86.exe 1528 igfxdr86.exe 1040 igfxdr86.exe 1536 igfxdr86.exe 332 igfxdr86.exe 2904 igfxdr86.exe 2848 igfxdr86.exe 2548 igfxdr86.exe 2836 igfxdr86.exe 1272 igfxdr86.exe 2744 igfxdr86.exe 1144 igfxdr86.exe 2952 igfxdr86.exe 2944 igfxdr86.exe 1760 igfxdr86.exe 2488 igfxdr86.exe 696 igfxdr86.exe 2484 igfxdr86.exe 2056 igfxdr86.exe 2524 igfxdr86.exe 2416 igfxdr86.exe -
Loads dropped DLL 64 IoCs
pid Process 2580 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 2580 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 1940 igfxdr86.exe 1940 igfxdr86.exe 2744 igfxdr86.exe 2744 igfxdr86.exe 344 igfxdr86.exe 344 igfxdr86.exe 1740 igfxdr86.exe 1740 igfxdr86.exe 1960 igfxdr86.exe 1960 igfxdr86.exe 2208 igfxdr86.exe 2208 igfxdr86.exe 3044 igfxdr86.exe 3044 igfxdr86.exe 1276 igfxdr86.exe 1276 igfxdr86.exe 1480 igfxdr86.exe 1480 igfxdr86.exe 1112 igfxdr86.exe 1112 igfxdr86.exe 1600 igfxdr86.exe 1600 igfxdr86.exe 2736 igfxdr86.exe 2736 igfxdr86.exe 2332 igfxdr86.exe 2332 igfxdr86.exe 2772 igfxdr86.exe 2772 igfxdr86.exe 1856 igfxdr86.exe 1856 igfxdr86.exe 1668 igfxdr86.exe 1668 igfxdr86.exe 2308 igfxdr86.exe 2308 igfxdr86.exe 2444 igfxdr86.exe 2444 igfxdr86.exe 1864 igfxdr86.exe 1864 igfxdr86.exe 2276 igfxdr86.exe 2276 igfxdr86.exe 300 igfxdr86.exe 300 igfxdr86.exe 1480 igfxdr86.exe 1480 igfxdr86.exe 2352 igfxdr86.exe 2352 igfxdr86.exe 2888 igfxdr86.exe 2888 igfxdr86.exe 2776 igfxdr86.exe 2776 igfxdr86.exe 908 igfxdr86.exe 908 igfxdr86.exe 2940 igfxdr86.exe 2940 igfxdr86.exe 2676 igfxdr86.exe 2676 igfxdr86.exe 2968 igfxdr86.exe 2968 igfxdr86.exe 2220 igfxdr86.exe 2220 igfxdr86.exe 1528 igfxdr86.exe 1528 igfxdr86.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdr86.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 51 IoCs
pid Process 2580 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 1940 igfxdr86.exe 2744 igfxdr86.exe 344 igfxdr86.exe 1740 igfxdr86.exe 1960 igfxdr86.exe 2208 igfxdr86.exe 3044 igfxdr86.exe 1276 igfxdr86.exe 1480 igfxdr86.exe 1112 igfxdr86.exe 1600 igfxdr86.exe 2736 igfxdr86.exe 2332 igfxdr86.exe 2772 igfxdr86.exe 1856 igfxdr86.exe 1668 igfxdr86.exe 2308 igfxdr86.exe 2444 igfxdr86.exe 1864 igfxdr86.exe 2276 igfxdr86.exe 300 igfxdr86.exe 1480 igfxdr86.exe 2352 igfxdr86.exe 2888 igfxdr86.exe 2776 igfxdr86.exe 908 igfxdr86.exe 2940 igfxdr86.exe 2676 igfxdr86.exe 2968 igfxdr86.exe 2220 igfxdr86.exe 1528 igfxdr86.exe 1040 igfxdr86.exe 1536 igfxdr86.exe 332 igfxdr86.exe 2904 igfxdr86.exe 2848 igfxdr86.exe 2548 igfxdr86.exe 2836 igfxdr86.exe 1272 igfxdr86.exe 2744 igfxdr86.exe 1144 igfxdr86.exe 2952 igfxdr86.exe 2944 igfxdr86.exe 1760 igfxdr86.exe 2488 igfxdr86.exe 696 igfxdr86.exe 2484 igfxdr86.exe 2056 igfxdr86.exe 2524 igfxdr86.exe 2416 igfxdr86.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 50 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2580 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 2580 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 2580 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 2580 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 2580 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 2580 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 2580 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 2580 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 2580 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 2580 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 2580 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 2580 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 2580 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 2580 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 2580 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 1940 igfxdr86.exe 1940 igfxdr86.exe 1940 igfxdr86.exe 1940 igfxdr86.exe 1940 igfxdr86.exe 1940 igfxdr86.exe 1940 igfxdr86.exe 1940 igfxdr86.exe 1940 igfxdr86.exe 1940 igfxdr86.exe 1940 igfxdr86.exe 1940 igfxdr86.exe 1940 igfxdr86.exe 1940 igfxdr86.exe 1940 igfxdr86.exe 2744 igfxdr86.exe 2744 igfxdr86.exe 2744 igfxdr86.exe 2744 igfxdr86.exe 2744 igfxdr86.exe 2744 igfxdr86.exe 2744 igfxdr86.exe 2744 igfxdr86.exe 2744 igfxdr86.exe 2744 igfxdr86.exe 2744 igfxdr86.exe 2744 igfxdr86.exe 2744 igfxdr86.exe 2744 igfxdr86.exe 2744 igfxdr86.exe 344 igfxdr86.exe 344 igfxdr86.exe 344 igfxdr86.exe 344 igfxdr86.exe 344 igfxdr86.exe 344 igfxdr86.exe 344 igfxdr86.exe 344 igfxdr86.exe 344 igfxdr86.exe 344 igfxdr86.exe 344 igfxdr86.exe 344 igfxdr86.exe 344 igfxdr86.exe 344 igfxdr86.exe 344 igfxdr86.exe 1740 igfxdr86.exe 1740 igfxdr86.exe 1740 igfxdr86.exe 1740 igfxdr86.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2580 wrote to memory of 1940 2580 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 30 PID 2580 wrote to memory of 1940 2580 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 30 PID 2580 wrote to memory of 1940 2580 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 30 PID 2580 wrote to memory of 1940 2580 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 30 PID 1940 wrote to memory of 2744 1940 igfxdr86.exe 31 PID 1940 wrote to memory of 2744 1940 igfxdr86.exe 31 PID 1940 wrote to memory of 2744 1940 igfxdr86.exe 31 PID 1940 wrote to memory of 2744 1940 igfxdr86.exe 31 PID 2744 wrote to memory of 344 2744 igfxdr86.exe 33 PID 2744 wrote to memory of 344 2744 igfxdr86.exe 33 PID 2744 wrote to memory of 344 2744 igfxdr86.exe 33 PID 2744 wrote to memory of 344 2744 igfxdr86.exe 33 PID 344 wrote to memory of 1740 344 igfxdr86.exe 34 PID 344 wrote to memory of 1740 344 igfxdr86.exe 34 PID 344 wrote to memory of 1740 344 igfxdr86.exe 34 PID 344 wrote to memory of 1740 344 igfxdr86.exe 34 PID 1740 wrote to memory of 1960 1740 igfxdr86.exe 35 PID 1740 wrote to memory of 1960 1740 igfxdr86.exe 35 PID 1740 wrote to memory of 1960 1740 igfxdr86.exe 35 PID 1740 wrote to memory of 1960 1740 igfxdr86.exe 35 PID 1960 wrote to memory of 2208 1960 igfxdr86.exe 36 PID 1960 wrote to memory of 2208 1960 igfxdr86.exe 36 PID 1960 wrote to memory of 2208 1960 igfxdr86.exe 36 PID 1960 wrote to memory of 2208 1960 igfxdr86.exe 36 PID 2208 wrote to memory of 3044 2208 igfxdr86.exe 37 PID 2208 wrote to memory of 3044 2208 igfxdr86.exe 37 PID 2208 wrote to memory of 3044 2208 igfxdr86.exe 37 PID 2208 wrote to memory of 3044 2208 igfxdr86.exe 37 PID 3044 wrote to memory of 1276 3044 igfxdr86.exe 38 PID 3044 wrote to memory of 1276 3044 igfxdr86.exe 38 PID 3044 wrote to memory of 1276 3044 igfxdr86.exe 38 PID 3044 wrote to memory of 1276 3044 igfxdr86.exe 38 PID 1276 wrote to memory of 1480 1276 igfxdr86.exe 39 PID 1276 wrote to memory of 1480 1276 igfxdr86.exe 39 PID 1276 wrote to memory of 1480 1276 igfxdr86.exe 39 PID 1276 wrote to memory of 1480 1276 igfxdr86.exe 39 PID 1480 wrote to memory of 1112 1480 igfxdr86.exe 40 PID 1480 wrote to memory of 1112 1480 igfxdr86.exe 40 PID 1480 wrote to memory of 1112 1480 igfxdr86.exe 40 PID 1480 wrote to memory of 1112 1480 igfxdr86.exe 40 PID 1112 wrote to memory of 1600 1112 igfxdr86.exe 41 PID 1112 wrote to memory of 1600 1112 igfxdr86.exe 41 PID 1112 wrote to memory of 1600 1112 igfxdr86.exe 41 PID 1112 wrote to memory of 1600 1112 igfxdr86.exe 41 PID 1600 wrote to memory of 2736 1600 igfxdr86.exe 42 PID 1600 wrote to memory of 2736 1600 igfxdr86.exe 42 PID 1600 wrote to memory of 2736 1600 igfxdr86.exe 42 PID 1600 wrote to memory of 2736 1600 igfxdr86.exe 42 PID 2736 wrote to memory of 2332 2736 igfxdr86.exe 43 PID 2736 wrote to memory of 2332 2736 igfxdr86.exe 43 PID 2736 wrote to memory of 2332 2736 igfxdr86.exe 43 PID 2736 wrote to memory of 2332 2736 igfxdr86.exe 43 PID 2332 wrote to memory of 2772 2332 igfxdr86.exe 44 PID 2332 wrote to memory of 2772 2332 igfxdr86.exe 44 PID 2332 wrote to memory of 2772 2332 igfxdr86.exe 44 PID 2332 wrote to memory of 2772 2332 igfxdr86.exe 44 PID 2772 wrote to memory of 1856 2772 igfxdr86.exe 45 PID 2772 wrote to memory of 1856 2772 igfxdr86.exe 45 PID 2772 wrote to memory of 1856 2772 igfxdr86.exe 45 PID 2772 wrote to memory of 1856 2772 igfxdr86.exe 45 PID 1856 wrote to memory of 1668 1856 igfxdr86.exe 46 PID 1856 wrote to memory of 1668 1856 igfxdr86.exe 46 PID 1856 wrote to memory of 1668 1856 igfxdr86.exe 46 PID 1856 wrote to memory of 1668 1856 igfxdr86.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1668 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2308 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2444 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1864 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2276 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:300 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1480 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2352 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2888 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2776 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:908 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2940 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2676 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2220 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1528 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1040 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1536 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:332 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2904 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2848 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2548 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2836 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1272 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2744 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1144 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2952 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2944 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1760 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2488 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:696 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2484 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe49⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2056 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe50⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2524 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe51⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2416
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD59910ca411dbe1e1847c3ace760992466
SHA1d47a1d6173aa8118003f1bc6a7d65dbb1ba8593a
SHA2560c85e687842116093c0804b2098c21a57fa383b0b97593c5d8eb9bf1491bd4bd
SHA512a4b81a13b03354d03faa47499093c1180034ad76a404220d349f77573f87ff653f188cd9e02bfcd31ae1b0af671b31748d43a26f115e38ec150e2a28994aabf8