Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/04/2024, 20:58
Static task
static1
Behavioral task
behavioral1
Sample
039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
039c40e72a78fb12566fc9cb3deac1cc
-
SHA1
601cbce091f3239bce6a72102922830c6b84383e
-
SHA256
cf50b85ce6529e189b6641d62b8920eb574531c95360f7d083091e7f4cde68c6
-
SHA512
5b13bf40241ade99dff429397b9febbae23e9db27ef6326f1f6bcb27e3102a313a7c75fc0b7aa2d8b30f0f062782b4e434074831f8dc5bb5a2ccdd51e353bb38
-
SSDEEP
12288:cTBHBsMHBGWXuHE7J/zBC1R85BrbWHj9fzT7/et2WN6CuBwuGDocbAci:cTjs3WXYE1rBCU5Brb4fjmtxN6C0co
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation acrotray .exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation acrotray.exe -
Executes dropped EXE 4 IoCs
pid Process 2932 acrotray.exe 2044 acrotray.exe 860 acrotray .exe 1728 acrotray .exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe_Reader = "C:\\Program Files (x86)\\Adobe\\acrotray.exe" 039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\acrotray .exe 039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe File created C:\Program Files (x86)\Adobe\acrotray.exe 039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe File created \??\c:\program files (x86)\common files\java\java update\jusched.exe 039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3615199055" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000150dfb3d7d297149b53fa5015b24f84400000000020000000000106600000001000020000000ee4efea4454443cd2fec6389126da31d8abd9fb8250a1c64ff4cca7c0e4ca355000000000e800000000200002000000080ba363918d8f354a2a08f500572250a0f976bdd03245e92b369b998f0523065200000008d2f560fdad7a6c7bb136ef89c7fbe505c7ca70b409313acb62cdb125e576a05400000002151b3553d7d4d0b4ba772d52d9f46c674e58f78c7d85e730f6ad1033afae3806cc9a111cb9b2a9cb7c274aabb7c014828b5d091c127b0f787f38e5ca3441ee4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31103205" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c078a8d2e598da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31103205" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0a39ce2e598da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{031DEF1B-04D9-11EF-B865-DAF73E7B7C22} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000150dfb3d7d297149b53fa5015b24f84400000000020000000000106600000001000020000000fe549936c869137fc1b5cab149eebd14c4379659373c9e2b7bca5679aee66ae6000000000e80000000020000200000008be9fb025b19ee7650db6b699f0166ff7bfa735f355b7fc822c3ddb3d05eb7e720000000cf4ff1a272c5fd83b0b42dfe67e5d9773b8d10173160f03bf075eea243f669ed40000000f826442da899e89dc710d9f9dd8e3e129cdfbf79c1ddea39e345ee7e54ab6af684ae9fe07d02fa2add583c9406b1973fe78c873eac31407ed90ebb993b0b1206 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f02d10c7e598da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3615199055" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 709777c6e598da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000150dfb3d7d297149b53fa5015b24f84400000000020000000000106600000001000020000000fc1708dcc070ec49b24b2c753f7c684fdd0d3e80d990135bb528e7633ccbbd23000000000e8000000002000020000000b1f87168223700f06e91342d538c2a64267804c92cb9036db0230443e3c59cdf20000000d42c756a911942f7adc617a8e6158a593f56a71dfa9187908c566aeac2d0504c4000000075c8949420a29430078936ead10baf05128f5b0dfa6e12241f563bbad03755aaccf2ad51128d806402a8b8c65a80c9c344ad3f37865630e4a90b8ab0e8113aa7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000150dfb3d7d297149b53fa5015b24f8440000000002000000000010660000000100002000000025e1ce1e2981a9cbe19931d68faf71afabd679ead1a7c34ddc8f96138ea9d046000000000e800000000200002000000089d9c77cb06586f17d6e33cb9a8da2fc26a8d9eb7ae2bbde8ded1e3b6a85f5702000000016d4536884eb1f8fe76cf70e0a175b266e99164ed5f5d5f2c76c263927eaf5404000000050ce669555b41e2a1306f2be6d7aefb29ee8f6dca23403b1441192db8c132ad7663337a34c9ddfdbad0925a775c3a4ca4ec27461508b8224295d47a099c06f9b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 944 039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe 944 039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe 944 039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe 944 039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe 944 039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe 944 039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe 2840 039c40e72a78fb12566fc9cb3deac1cc_jaffacakes118.exe 2840 039c40e72a78fb12566fc9cb3deac1cc_jaffacakes118.exe 2840 039c40e72a78fb12566fc9cb3deac1cc_jaffacakes118.exe 2840 039c40e72a78fb12566fc9cb3deac1cc_jaffacakes118.exe 2932 acrotray.exe 2932 acrotray.exe 2932 acrotray.exe 2932 acrotray.exe 2932 acrotray.exe 2932 acrotray.exe 2044 acrotray.exe 2044 acrotray.exe 2044 acrotray.exe 2044 acrotray.exe 860 acrotray .exe 860 acrotray .exe 860 acrotray .exe 860 acrotray .exe 860 acrotray .exe 860 acrotray .exe 1728 acrotray .exe 1728 acrotray .exe 1728 acrotray .exe 1728 acrotray .exe 2840 039c40e72a78fb12566fc9cb3deac1cc_jaffacakes118.exe 2840 039c40e72a78fb12566fc9cb3deac1cc_jaffacakes118.exe 2044 acrotray.exe 2044 acrotray.exe 1728 acrotray .exe 1728 acrotray .exe 2840 039c40e72a78fb12566fc9cb3deac1cc_jaffacakes118.exe 2840 039c40e72a78fb12566fc9cb3deac1cc_jaffacakes118.exe 2044 acrotray.exe 2044 acrotray.exe 1728 acrotray .exe 1728 acrotray .exe 2840 039c40e72a78fb12566fc9cb3deac1cc_jaffacakes118.exe 2840 039c40e72a78fb12566fc9cb3deac1cc_jaffacakes118.exe 2044 acrotray.exe 2044 acrotray.exe 1728 acrotray .exe 1728 acrotray .exe 2840 039c40e72a78fb12566fc9cb3deac1cc_jaffacakes118.exe 2840 039c40e72a78fb12566fc9cb3deac1cc_jaffacakes118.exe 2044 acrotray.exe 2044 acrotray.exe 1728 acrotray .exe 1728 acrotray .exe 2840 039c40e72a78fb12566fc9cb3deac1cc_jaffacakes118.exe 2840 039c40e72a78fb12566fc9cb3deac1cc_jaffacakes118.exe 2044 acrotray.exe 2044 acrotray.exe 1728 acrotray .exe 1728 acrotray .exe 2840 039c40e72a78fb12566fc9cb3deac1cc_jaffacakes118.exe 2840 039c40e72a78fb12566fc9cb3deac1cc_jaffacakes118.exe 2044 acrotray.exe 2044 acrotray.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 944 039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe Token: SeDebugPrivilege 2840 039c40e72a78fb12566fc9cb3deac1cc_jaffacakes118.exe Token: SeDebugPrivilege 2932 acrotray.exe Token: SeDebugPrivilege 2044 acrotray.exe Token: SeDebugPrivilege 860 acrotray .exe Token: SeDebugPrivilege 1728 acrotray .exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4876 iexplore.exe 4876 iexplore.exe 4876 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4876 iexplore.exe 4876 iexplore.exe 4796 IEXPLORE.EXE 4796 IEXPLORE.EXE 4876 iexplore.exe 4876 iexplore.exe 3104 IEXPLORE.EXE 3104 IEXPLORE.EXE 4876 iexplore.exe 4876 iexplore.exe 1832 IEXPLORE.EXE 1832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 944 wrote to memory of 2840 944 039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe 84 PID 944 wrote to memory of 2840 944 039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe 84 PID 944 wrote to memory of 2840 944 039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe 84 PID 944 wrote to memory of 2932 944 039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe 89 PID 944 wrote to memory of 2932 944 039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe 89 PID 944 wrote to memory of 2932 944 039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe 89 PID 2932 wrote to memory of 2044 2932 acrotray.exe 92 PID 2932 wrote to memory of 2044 2932 acrotray.exe 92 PID 2932 wrote to memory of 2044 2932 acrotray.exe 92 PID 2932 wrote to memory of 860 2932 acrotray.exe 93 PID 2932 wrote to memory of 860 2932 acrotray.exe 93 PID 2932 wrote to memory of 860 2932 acrotray.exe 93 PID 4876 wrote to memory of 4796 4876 iexplore.exe 94 PID 4876 wrote to memory of 4796 4876 iexplore.exe 94 PID 4876 wrote to memory of 4796 4876 iexplore.exe 94 PID 860 wrote to memory of 1728 860 acrotray .exe 95 PID 860 wrote to memory of 1728 860 acrotray .exe 95 PID 860 wrote to memory of 1728 860 acrotray .exe 95 PID 4876 wrote to memory of 3104 4876 iexplore.exe 99 PID 4876 wrote to memory of 3104 4876 iexplore.exe 99 PID 4876 wrote to memory of 3104 4876 iexplore.exe 99 PID 4876 wrote to memory of 1832 4876 iexplore.exe 100 PID 4876 wrote to memory of 1832 4876 iexplore.exe 100 PID 4876 wrote to memory of 1832 4876 iexplore.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\039c40e72a78fb12566fc9cb3deac1cc_jaffacakes118.exe"C:\Users\Admin\AppData\Local\Temp\039c40e72a78fb12566fc9cb3deac1cc_jaffacakes118.exe" C:\Users\Admin\AppData\Local\Temp\039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
C:\Program Files (x86)\Adobe\acrotray.exe"C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Adobe\acrotray.exe"C:\Program Files (x86)\Adobe\acrotray.exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
-
C:\Program Files (x86)\Adobe\acrotray .exe"C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Program Files (x86)\Adobe\acrotray .exe"C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:1956
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4876 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4796
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4876 CREDAT:82950 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3104
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4876 CREDAT:17412 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD59e46d0a61d9ca70f1fe944665981ff8b
SHA16c7530ac87193c1ce8a66806abd05ae2a142daf9
SHA256d8a0f55d7eb78cec028db8efd24aaf4a401ade500ca58ef7ffd9a7295bb54b4c
SHA512a31ac219e81ec51e6cb5d74da99205b19dd1b5885b022dbc86a157eb1e650c7c6d18c8751d64ea6d1249d36d5f687fdd2216dd0d29a36497d6900da33ceaa172
-
Filesize
1.1MB
MD53b23d385acbe937b7867bce71e0ea3cd
SHA17e1252a8d43e648367d51f51c8791e6bf9fd1a4e
SHA2562a9343710bffc54888ed43781854f36172b1a78de5905dcd15ff0849a5dae855
SHA5129f24e1be92832743f118be96cf538292fb68ddbf0c053ed6d1786de02acb931686ce0a27cca05a9762401b0fef33fc0bf4cd7f9d32a70764a25665930ad1c864