Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 19:54
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe
-
Size
196KB
-
MD5
9910ca411dbe1e1847c3ace760992466
-
SHA1
d47a1d6173aa8118003f1bc6a7d65dbb1ba8593a
-
SHA256
0c85e687842116093c0804b2098c21a57fa383b0b97593c5d8eb9bf1491bd4bd
-
SHA512
a4b81a13b03354d03faa47499093c1180034ad76a404220d349f77573f87ff653f188cd9e02bfcd31ae1b0af671b31748d43a26f115e38ec150e2a28994aabf8
-
SSDEEP
6144:HDYRzSzx2g/bP7P3qwK7b3XkMyvBNKLV8bQQkV6+K:jYUz8mPzxK7zkLJNKLV8MQ60
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 43 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation igfxdr86.exe -
Deletes itself 1 IoCs
pid Process 2568 igfxdr86.exe -
Executes dropped EXE 42 IoCs
pid Process 2568 igfxdr86.exe 4328 igfxdr86.exe 3752 igfxdr86.exe 4932 igfxdr86.exe 5228 igfxdr86.exe 4696 igfxdr86.exe 2740 igfxdr86.exe 1940 igfxdr86.exe 5596 igfxdr86.exe 3788 igfxdr86.exe 2444 igfxdr86.exe 3928 igfxdr86.exe 4260 igfxdr86.exe 3608 igfxdr86.exe 3360 igfxdr86.exe 3580 igfxdr86.exe 2288 igfxdr86.exe 4896 igfxdr86.exe 2300 igfxdr86.exe 4920 igfxdr86.exe 1340 igfxdr86.exe 5604 igfxdr86.exe 1492 igfxdr86.exe 5560 igfxdr86.exe 4684 igfxdr86.exe 6112 igfxdr86.exe 2344 igfxdr86.exe 5272 igfxdr86.exe 5124 igfxdr86.exe 5844 igfxdr86.exe 4100 igfxdr86.exe 3456 igfxdr86.exe 4612 igfxdr86.exe 3728 igfxdr86.exe 4276 igfxdr86.exe 2432 igfxdr86.exe 1112 igfxdr86.exe 1248 igfxdr86.exe 4428 igfxdr86.exe 5884 igfxdr86.exe 1136 igfxdr86.exe 2868 igfxdr86.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr86.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe File created C:\Windows\SysWOW64\igfxdr86.exe JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File opened for modification C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File opened for modification C:\Windows\SysWOW64\ igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe File created C:\Windows\SysWOW64\igfxdr86.exe igfxdr86.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 43 IoCs
pid Process 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 2568 igfxdr86.exe 4328 igfxdr86.exe 3752 igfxdr86.exe 4932 igfxdr86.exe 5228 igfxdr86.exe 4696 igfxdr86.exe 2740 igfxdr86.exe 1940 igfxdr86.exe 5596 igfxdr86.exe 3788 igfxdr86.exe 2444 igfxdr86.exe 3928 igfxdr86.exe 4260 igfxdr86.exe 3608 igfxdr86.exe 3360 igfxdr86.exe 3580 igfxdr86.exe 2288 igfxdr86.exe 4896 igfxdr86.exe 2300 igfxdr86.exe 4920 igfxdr86.exe 1340 igfxdr86.exe 5604 igfxdr86.exe 1492 igfxdr86.exe 5560 igfxdr86.exe 4684 igfxdr86.exe 6112 igfxdr86.exe 2344 igfxdr86.exe 5272 igfxdr86.exe 5124 igfxdr86.exe 5844 igfxdr86.exe 4100 igfxdr86.exe 3456 igfxdr86.exe 4612 igfxdr86.exe 3728 igfxdr86.exe 4276 igfxdr86.exe 2432 igfxdr86.exe 1112 igfxdr86.exe 1248 igfxdr86.exe 4428 igfxdr86.exe 5884 igfxdr86.exe 1136 igfxdr86.exe 2868 igfxdr86.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 43 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdr86.exe -
Modifies registry class 43 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr86.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 2568 igfxdr86.exe 2568 igfxdr86.exe 2568 igfxdr86.exe 2568 igfxdr86.exe 2568 igfxdr86.exe 2568 igfxdr86.exe 2568 igfxdr86.exe 2568 igfxdr86.exe 2568 igfxdr86.exe 2568 igfxdr86.exe 2568 igfxdr86.exe 2568 igfxdr86.exe 2568 igfxdr86.exe 2568 igfxdr86.exe 2568 igfxdr86.exe 2568 igfxdr86.exe 2568 igfxdr86.exe 2568 igfxdr86.exe 2568 igfxdr86.exe 2568 igfxdr86.exe 2568 igfxdr86.exe 2568 igfxdr86.exe 2568 igfxdr86.exe 2568 igfxdr86.exe 2568 igfxdr86.exe 2568 igfxdr86.exe 2568 igfxdr86.exe 2568 igfxdr86.exe 2568 igfxdr86.exe 2568 igfxdr86.exe 4328 igfxdr86.exe 4328 igfxdr86.exe 4328 igfxdr86.exe 4328 igfxdr86.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5788 wrote to memory of 2568 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 94 PID 5788 wrote to memory of 2568 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 94 PID 5788 wrote to memory of 2568 5788 JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe 94 PID 2568 wrote to memory of 4328 2568 igfxdr86.exe 98 PID 2568 wrote to memory of 4328 2568 igfxdr86.exe 98 PID 2568 wrote to memory of 4328 2568 igfxdr86.exe 98 PID 4328 wrote to memory of 3752 4328 igfxdr86.exe 101 PID 4328 wrote to memory of 3752 4328 igfxdr86.exe 101 PID 4328 wrote to memory of 3752 4328 igfxdr86.exe 101 PID 3752 wrote to memory of 4932 3752 igfxdr86.exe 102 PID 3752 wrote to memory of 4932 3752 igfxdr86.exe 102 PID 3752 wrote to memory of 4932 3752 igfxdr86.exe 102 PID 4932 wrote to memory of 5228 4932 igfxdr86.exe 103 PID 4932 wrote to memory of 5228 4932 igfxdr86.exe 103 PID 4932 wrote to memory of 5228 4932 igfxdr86.exe 103 PID 5228 wrote to memory of 4696 5228 igfxdr86.exe 104 PID 5228 wrote to memory of 4696 5228 igfxdr86.exe 104 PID 5228 wrote to memory of 4696 5228 igfxdr86.exe 104 PID 4696 wrote to memory of 2740 4696 igfxdr86.exe 105 PID 4696 wrote to memory of 2740 4696 igfxdr86.exe 105 PID 4696 wrote to memory of 2740 4696 igfxdr86.exe 105 PID 2740 wrote to memory of 1940 2740 igfxdr86.exe 106 PID 2740 wrote to memory of 1940 2740 igfxdr86.exe 106 PID 2740 wrote to memory of 1940 2740 igfxdr86.exe 106 PID 1940 wrote to memory of 5596 1940 igfxdr86.exe 108 PID 1940 wrote to memory of 5596 1940 igfxdr86.exe 108 PID 1940 wrote to memory of 5596 1940 igfxdr86.exe 108 PID 5596 wrote to memory of 3788 5596 igfxdr86.exe 109 PID 5596 wrote to memory of 3788 5596 igfxdr86.exe 109 PID 5596 wrote to memory of 3788 5596 igfxdr86.exe 109 PID 3788 wrote to memory of 2444 3788 igfxdr86.exe 114 PID 3788 wrote to memory of 2444 3788 igfxdr86.exe 114 PID 3788 wrote to memory of 2444 3788 igfxdr86.exe 114 PID 2444 wrote to memory of 3928 2444 igfxdr86.exe 118 PID 2444 wrote to memory of 3928 2444 igfxdr86.exe 118 PID 2444 wrote to memory of 3928 2444 igfxdr86.exe 118 PID 3928 wrote to memory of 4260 3928 igfxdr86.exe 119 PID 3928 wrote to memory of 4260 3928 igfxdr86.exe 119 PID 3928 wrote to memory of 4260 3928 igfxdr86.exe 119 PID 4260 wrote to memory of 3608 4260 igfxdr86.exe 120 PID 4260 wrote to memory of 3608 4260 igfxdr86.exe 120 PID 4260 wrote to memory of 3608 4260 igfxdr86.exe 120 PID 3608 wrote to memory of 3360 3608 igfxdr86.exe 121 PID 3608 wrote to memory of 3360 3608 igfxdr86.exe 121 PID 3608 wrote to memory of 3360 3608 igfxdr86.exe 121 PID 3360 wrote to memory of 3580 3360 igfxdr86.exe 122 PID 3360 wrote to memory of 3580 3360 igfxdr86.exe 122 PID 3360 wrote to memory of 3580 3360 igfxdr86.exe 122 PID 3580 wrote to memory of 2288 3580 igfxdr86.exe 123 PID 3580 wrote to memory of 2288 3580 igfxdr86.exe 123 PID 3580 wrote to memory of 2288 3580 igfxdr86.exe 123 PID 2288 wrote to memory of 4896 2288 igfxdr86.exe 124 PID 2288 wrote to memory of 4896 2288 igfxdr86.exe 124 PID 2288 wrote to memory of 4896 2288 igfxdr86.exe 124 PID 4896 wrote to memory of 2300 4896 igfxdr86.exe 125 PID 4896 wrote to memory of 2300 4896 igfxdr86.exe 125 PID 4896 wrote to memory of 2300 4896 igfxdr86.exe 125 PID 2300 wrote to memory of 4920 2300 igfxdr86.exe 126 PID 2300 wrote to memory of 4920 2300 igfxdr86.exe 126 PID 2300 wrote to memory of 4920 2300 igfxdr86.exe 126 PID 4920 wrote to memory of 1340 4920 igfxdr86.exe 128 PID 4920 wrote to memory of 1340 4920 igfxdr86.exe 128 PID 4920 wrote to memory of 1340 4920 igfxdr86.exe 128 PID 1340 wrote to memory of 5604 1340 igfxdr86.exe 129
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9910ca411dbe1e1847c3ace760992466.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5788 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5228 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe9⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5596 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe13⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe17⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe21⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe23⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5604 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1492 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe25⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5560 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4684 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe27⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:6112 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2344 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe29⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5272 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5124 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe31⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5844 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4100 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe33⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3456 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe34⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4612 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe35⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3728 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe36⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4276 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe37⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2432 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1112 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe39⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1248 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4428 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe41⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5884 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe42⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1136 -
C:\Windows\SysWOW64\igfxdr86.exe"C:\Windows\system32\igfxdr86.exe" C:\Windows\SysWOW64\igfxdr86.exe43⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2868
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD59910ca411dbe1e1847c3ace760992466
SHA1d47a1d6173aa8118003f1bc6a7d65dbb1ba8593a
SHA2560c85e687842116093c0804b2098c21a57fa383b0b97593c5d8eb9bf1491bd4bd
SHA512a4b81a13b03354d03faa47499093c1180034ad76a404220d349f77573f87ff653f188cd9e02bfcd31ae1b0af671b31748d43a26f115e38ec150e2a28994aabf8