Analysis
-
max time kernel
150s -
max time network
103s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/04/2025, 17:25
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ba719dd297e477de82fbc9556e883f62.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ba719dd297e477de82fbc9556e883f62.exe
Resource
win11-20250410-en
General
-
Target
JaffaCakes118_ba719dd297e477de82fbc9556e883f62.exe
-
Size
224KB
-
MD5
ba719dd297e477de82fbc9556e883f62
-
SHA1
380ecc17cab59d866431e0fa4cbab294e205f1b9
-
SHA256
34180f040323dadcd3796156da28c26367132346377cf288e9622abb42db6b75
-
SHA512
f4e88de105c0019d351a0d7e3ef8eeba836ea9b4251bb836d3cb44f0b09c97ebe612ec047c4a4df6bb72b920fefcf9cfd9161a91974c154b02695a55381b2b3b
-
SSDEEP
6144:rZ2qQKPL1qQPhp3Exz8vehZZDvgSeQ7tGJF:rZ2qHB15p3EHleh
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2968 igfxpr32.exe -
Executes dropped EXE 64 IoCs
pid Process 2360 igfxpr32.exe 2968 igfxpr32.exe 5148 igfxpr32.exe 5020 igfxpr32.exe 5116 igfxpr32.exe 4412 igfxpr32.exe 4404 igfxpr32.exe 3676 igfxpr32.exe 3664 igfxpr32.exe 3324 igfxpr32.exe 4596 igfxpr32.exe 2356 igfxpr32.exe 1792 igfxpr32.exe 3752 igfxpr32.exe 3448 igfxpr32.exe 5724 igfxpr32.exe 3876 igfxpr32.exe 5184 igfxpr32.exe 5940 igfxpr32.exe 4156 igfxpr32.exe 4520 igfxpr32.exe 2104 igfxpr32.exe 2368 igfxpr32.exe 5824 igfxpr32.exe 6136 igfxpr32.exe 4888 igfxpr32.exe 5896 igfxpr32.exe 2748 igfxpr32.exe 2176 igfxpr32.exe 4380 igfxpr32.exe 3744 igfxpr32.exe 5976 igfxpr32.exe 2784 igfxpr32.exe 3008 igfxpr32.exe 5324 igfxpr32.exe 3516 igfxpr32.exe 2496 igfxpr32.exe 2344 igfxpr32.exe 5908 igfxpr32.exe 4952 igfxpr32.exe 4016 igfxpr32.exe 564 igfxpr32.exe 5928 igfxpr32.exe 3748 igfxpr32.exe 2760 igfxpr32.exe 4908 igfxpr32.exe 6016 igfxpr32.exe 1028 igfxpr32.exe 648 igfxpr32.exe 5744 igfxpr32.exe 5480 igfxpr32.exe 5256 igfxpr32.exe 3032 igfxpr32.exe 1972 igfxpr32.exe 5740 igfxpr32.exe 1516 igfxpr32.exe 5628 igfxpr32.exe 6124 igfxpr32.exe 1052 igfxpr32.exe 3172 igfxpr32.exe 5988 igfxpr32.exe 3288 igfxpr32.exe 2484 igfxpr32.exe 2300 igfxpr32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum JaffaCakes118_ba719dd297e477de82fbc9556e883f62.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 JaffaCakes118_ba719dd297e477de82fbc9556e883f62.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpr32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxpr32.exe File created C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxpr32.exe File created C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File created C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File created C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File created C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File created C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File opened for modification C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File opened for modification C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File opened for modification C:\Windows\SysWOW64\ JaffaCakes118_ba719dd297e477de82fbc9556e883f62.exe File created C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxpr32.exe File opened for modification C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File created C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File opened for modification C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File opened for modification C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File created C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File opened for modification C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxpr32.exe File opened for modification C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File created C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxpr32.exe File created C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxpr32.exe File opened for modification C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File created C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File opened for modification C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File opened for modification C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxpr32.exe File opened for modification C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxpr32.exe File opened for modification C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxpr32.exe File opened for modification C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File opened for modification C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File created C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File opened for modification C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxpr32.exe File opened for modification C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File created C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File created C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxpr32.exe File created C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File created C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File created C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File opened for modification C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File opened for modification C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File created C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxpr32.exe File created C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File opened for modification C:\Windows\SysWOW64\igfxpr32.exe igfxpr32.exe File opened for modification C:\Windows\SysWOW64\ igfxpr32.exe -
Suspicious use of SetThreadContext 34 IoCs
description pid Process procid_target PID 3572 set thread context of 3424 3572 JaffaCakes118_ba719dd297e477de82fbc9556e883f62.exe 78 PID 2360 set thread context of 2968 2360 igfxpr32.exe 80 PID 5148 set thread context of 5020 5148 igfxpr32.exe 82 PID 5116 set thread context of 4412 5116 igfxpr32.exe 84 PID 4404 set thread context of 3676 4404 igfxpr32.exe 86 PID 3664 set thread context of 3324 3664 igfxpr32.exe 88 PID 4596 set thread context of 2356 4596 igfxpr32.exe 90 PID 1792 set thread context of 3752 1792 igfxpr32.exe 92 PID 3448 set thread context of 5724 3448 igfxpr32.exe 94 PID 3876 set thread context of 5184 3876 igfxpr32.exe 96 PID 5940 set thread context of 4156 5940 igfxpr32.exe 98 PID 4520 set thread context of 2104 4520 igfxpr32.exe 100 PID 2368 set thread context of 5824 2368 igfxpr32.exe 102 PID 6136 set thread context of 4888 6136 igfxpr32.exe 104 PID 5896 set thread context of 2748 5896 igfxpr32.exe 106 PID 2176 set thread context of 4380 2176 igfxpr32.exe 108 PID 3744 set thread context of 5976 3744 igfxpr32.exe 110 PID 2784 set thread context of 3008 2784 igfxpr32.exe 112 PID 5324 set thread context of 3516 5324 igfxpr32.exe 114 PID 2496 set thread context of 2344 2496 igfxpr32.exe 116 PID 5908 set thread context of 4952 5908 igfxpr32.exe 118 PID 4016 set thread context of 564 4016 igfxpr32.exe 120 PID 5928 set thread context of 3748 5928 igfxpr32.exe 122 PID 2760 set thread context of 4908 2760 igfxpr32.exe 124 PID 6016 set thread context of 1028 6016 igfxpr32.exe 126 PID 648 set thread context of 5744 648 igfxpr32.exe 128 PID 5480 set thread context of 5256 5480 igfxpr32.exe 130 PID 3032 set thread context of 1972 3032 igfxpr32.exe 132 PID 5740 set thread context of 1516 5740 igfxpr32.exe 134 PID 5628 set thread context of 6124 5628 igfxpr32.exe 136 PID 1052 set thread context of 3172 1052 igfxpr32.exe 138 PID 5988 set thread context of 3288 5988 igfxpr32.exe 140 PID 2484 set thread context of 2300 2484 igfxpr32.exe 142 PID 3552 set thread context of 5472 3552 igfxpr32.exe 144 -
resource yara_rule behavioral2/memory/3424-0-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3424-2-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3424-3-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3424-4-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3424-38-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2968-43-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2968-44-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2968-45-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2968-47-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/5020-53-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4412-61-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3676-68-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3324-75-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2356-83-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3752-92-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/5724-98-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/5184-106-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4156-110-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4156-111-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4156-115-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2104-120-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/5824-130-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4888-138-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2748-146-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4380-154-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/5976-162-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3008-170-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3516-178-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2344-186-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4952-194-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/564-202-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3748-209-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4908-215-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1028-221-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/5744-227-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/5256-233-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1972-239-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1516-245-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/6124-251-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3172-257-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3288-263-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2300-269-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ba719dd297e477de82fbc9556e883f62.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ba719dd297e477de82fbc9556e883f62.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpr32.exe -
Modifies registry class 33 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ JaffaCakes118_ba719dd297e477de82fbc9556e883f62.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpr32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3424 JaffaCakes118_ba719dd297e477de82fbc9556e883f62.exe 3424 JaffaCakes118_ba719dd297e477de82fbc9556e883f62.exe 3424 JaffaCakes118_ba719dd297e477de82fbc9556e883f62.exe 3424 JaffaCakes118_ba719dd297e477de82fbc9556e883f62.exe 2968 igfxpr32.exe 2968 igfxpr32.exe 2968 igfxpr32.exe 2968 igfxpr32.exe 5020 igfxpr32.exe 5020 igfxpr32.exe 5020 igfxpr32.exe 5020 igfxpr32.exe 4412 igfxpr32.exe 4412 igfxpr32.exe 4412 igfxpr32.exe 4412 igfxpr32.exe 3676 igfxpr32.exe 3676 igfxpr32.exe 3676 igfxpr32.exe 3676 igfxpr32.exe 3324 igfxpr32.exe 3324 igfxpr32.exe 3324 igfxpr32.exe 3324 igfxpr32.exe 2356 igfxpr32.exe 2356 igfxpr32.exe 2356 igfxpr32.exe 2356 igfxpr32.exe 3752 igfxpr32.exe 3752 igfxpr32.exe 3752 igfxpr32.exe 3752 igfxpr32.exe 5724 igfxpr32.exe 5724 igfxpr32.exe 5724 igfxpr32.exe 5724 igfxpr32.exe 5184 igfxpr32.exe 5184 igfxpr32.exe 5184 igfxpr32.exe 5184 igfxpr32.exe 4156 igfxpr32.exe 4156 igfxpr32.exe 4156 igfxpr32.exe 4156 igfxpr32.exe 2104 igfxpr32.exe 2104 igfxpr32.exe 2104 igfxpr32.exe 2104 igfxpr32.exe 5824 igfxpr32.exe 5824 igfxpr32.exe 5824 igfxpr32.exe 5824 igfxpr32.exe 4888 igfxpr32.exe 4888 igfxpr32.exe 4888 igfxpr32.exe 4888 igfxpr32.exe 2748 igfxpr32.exe 2748 igfxpr32.exe 2748 igfxpr32.exe 2748 igfxpr32.exe 4380 igfxpr32.exe 4380 igfxpr32.exe 4380 igfxpr32.exe 4380 igfxpr32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3572 wrote to memory of 3424 3572 JaffaCakes118_ba719dd297e477de82fbc9556e883f62.exe 78 PID 3572 wrote to memory of 3424 3572 JaffaCakes118_ba719dd297e477de82fbc9556e883f62.exe 78 PID 3572 wrote to memory of 3424 3572 JaffaCakes118_ba719dd297e477de82fbc9556e883f62.exe 78 PID 3572 wrote to memory of 3424 3572 JaffaCakes118_ba719dd297e477de82fbc9556e883f62.exe 78 PID 3572 wrote to memory of 3424 3572 JaffaCakes118_ba719dd297e477de82fbc9556e883f62.exe 78 PID 3572 wrote to memory of 3424 3572 JaffaCakes118_ba719dd297e477de82fbc9556e883f62.exe 78 PID 3572 wrote to memory of 3424 3572 JaffaCakes118_ba719dd297e477de82fbc9556e883f62.exe 78 PID 3424 wrote to memory of 2360 3424 JaffaCakes118_ba719dd297e477de82fbc9556e883f62.exe 79 PID 3424 wrote to memory of 2360 3424 JaffaCakes118_ba719dd297e477de82fbc9556e883f62.exe 79 PID 3424 wrote to memory of 2360 3424 JaffaCakes118_ba719dd297e477de82fbc9556e883f62.exe 79 PID 2360 wrote to memory of 2968 2360 igfxpr32.exe 80 PID 2360 wrote to memory of 2968 2360 igfxpr32.exe 80 PID 2360 wrote to memory of 2968 2360 igfxpr32.exe 80 PID 2360 wrote to memory of 2968 2360 igfxpr32.exe 80 PID 2360 wrote to memory of 2968 2360 igfxpr32.exe 80 PID 2360 wrote to memory of 2968 2360 igfxpr32.exe 80 PID 2360 wrote to memory of 2968 2360 igfxpr32.exe 80 PID 2968 wrote to memory of 5148 2968 igfxpr32.exe 81 PID 2968 wrote to memory of 5148 2968 igfxpr32.exe 81 PID 2968 wrote to memory of 5148 2968 igfxpr32.exe 81 PID 5148 wrote to memory of 5020 5148 igfxpr32.exe 82 PID 5148 wrote to memory of 5020 5148 igfxpr32.exe 82 PID 5148 wrote to memory of 5020 5148 igfxpr32.exe 82 PID 5148 wrote to memory of 5020 5148 igfxpr32.exe 82 PID 5148 wrote to memory of 5020 5148 igfxpr32.exe 82 PID 5148 wrote to memory of 5020 5148 igfxpr32.exe 82 PID 5148 wrote to memory of 5020 5148 igfxpr32.exe 82 PID 5020 wrote to memory of 5116 5020 igfxpr32.exe 83 PID 5020 wrote to memory of 5116 5020 igfxpr32.exe 83 PID 5020 wrote to memory of 5116 5020 igfxpr32.exe 83 PID 5116 wrote to memory of 4412 5116 igfxpr32.exe 84 PID 5116 wrote to memory of 4412 5116 igfxpr32.exe 84 PID 5116 wrote to memory of 4412 5116 igfxpr32.exe 84 PID 5116 wrote to memory of 4412 5116 igfxpr32.exe 84 PID 5116 wrote to memory of 4412 5116 igfxpr32.exe 84 PID 5116 wrote to memory of 4412 5116 igfxpr32.exe 84 PID 5116 wrote to memory of 4412 5116 igfxpr32.exe 84 PID 4412 wrote to memory of 4404 4412 igfxpr32.exe 85 PID 4412 wrote to memory of 4404 4412 igfxpr32.exe 85 PID 4412 wrote to memory of 4404 4412 igfxpr32.exe 85 PID 4404 wrote to memory of 3676 4404 igfxpr32.exe 86 PID 4404 wrote to memory of 3676 4404 igfxpr32.exe 86 PID 4404 wrote to memory of 3676 4404 igfxpr32.exe 86 PID 4404 wrote to memory of 3676 4404 igfxpr32.exe 86 PID 4404 wrote to memory of 3676 4404 igfxpr32.exe 86 PID 4404 wrote to memory of 3676 4404 igfxpr32.exe 86 PID 4404 wrote to memory of 3676 4404 igfxpr32.exe 86 PID 3676 wrote to memory of 3664 3676 igfxpr32.exe 87 PID 3676 wrote to memory of 3664 3676 igfxpr32.exe 87 PID 3676 wrote to memory of 3664 3676 igfxpr32.exe 87 PID 3664 wrote to memory of 3324 3664 igfxpr32.exe 88 PID 3664 wrote to memory of 3324 3664 igfxpr32.exe 88 PID 3664 wrote to memory of 3324 3664 igfxpr32.exe 88 PID 3664 wrote to memory of 3324 3664 igfxpr32.exe 88 PID 3664 wrote to memory of 3324 3664 igfxpr32.exe 88 PID 3664 wrote to memory of 3324 3664 igfxpr32.exe 88 PID 3664 wrote to memory of 3324 3664 igfxpr32.exe 88 PID 3324 wrote to memory of 4596 3324 igfxpr32.exe 89 PID 3324 wrote to memory of 4596 3324 igfxpr32.exe 89 PID 3324 wrote to memory of 4596 3324 igfxpr32.exe 89 PID 4596 wrote to memory of 2356 4596 igfxpr32.exe 90 PID 4596 wrote to memory of 2356 4596 igfxpr32.exe 90 PID 4596 wrote to memory of 2356 4596 igfxpr32.exe 90 PID 4596 wrote to memory of 2356 4596 igfxpr32.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ba719dd297e477de82fbc9556e883f62.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ba719dd297e477de82fbc9556e883f62.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ba719dd297e477de82fbc9556e883f62.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ba719dd297e477de82fbc9556e883f62.exe"2⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5148 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe6⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe8⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe10⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe12⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe14⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2356 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1792 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe16⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3752 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3448 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe18⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5724 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3876 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe20⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5184 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5940 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe22⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4156 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4520 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe24⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2104 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2368 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe26⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5824 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6136 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe28⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4888 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5896 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe30⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2748 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2176 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe32⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4380 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3744 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5976 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2784 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3008 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5324 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3516 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2496 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2344 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5908 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4952 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4016 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:564 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5928 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3748 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2760 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4908 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6016 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe50⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:1028 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:648 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe52⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5744 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5480 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe54⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5256 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3032 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe56⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1972 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5740 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe58⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1516 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5628 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe60⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:6124 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1052 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe62⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3172 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5988 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe64⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3288 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2484 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe66⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2300 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe67⤵
- Suspicious use of SetThreadContext
PID:3552 -
C:\Windows\SysWOW64\igfxpr32.exe"C:\Windows\system32\igfxpr32.exe" C:\Windows\SysWOW64\igfxpr32.exe68⤵
- Maps connected drives based on registry
- Drops file in System32 directory
PID:5472
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5ba719dd297e477de82fbc9556e883f62
SHA1380ecc17cab59d866431e0fa4cbab294e205f1b9
SHA25634180f040323dadcd3796156da28c26367132346377cf288e9622abb42db6b75
SHA512f4e88de105c0019d351a0d7e3ef8eeba836ea9b4251bb836d3cb44f0b09c97ebe612ec047c4a4df6bb72b920fefcf9cfd9161a91974c154b02695a55381b2b3b