Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 05:34
Static task
static1
Behavioral task
behavioral1
Sample
5333a8028037aa7f930852656ebe1ef5_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
5333a8028037aa7f930852656ebe1ef5_JaffaCakes118.exe
-
Size
296KB
-
MD5
5333a8028037aa7f930852656ebe1ef5
-
SHA1
2ac783c46074084eef9d4709e6d988870d2923bd
-
SHA256
664ea322e6547555932ef477e03fa5b953ec980a4ed4300fd91d8fd86a325e09
-
SHA512
ace591f9dc7a1cb329c0c813e431f88e0f97644e252e81a1069ccde9592804247c444686d85cd71f3adbf1ac2b2d8d14d8129052991e5da0c524ec4a166f9ee2
-
SSDEEP
3072:zbwmc9TBhxwFKZGWmk7XUzlvxHaQKA/2NND9vcJHCzSW2rSw+GAqYq:z3cxBoFPWZwxxansY0JiOraGZ
Malware Config
Extracted
gozi
-
build
214107
Extracted
gozi
3537
gmail.com
google.com
fjavieryvette94.com
wk1122roxanne.com
gs85elmoreobs.com
-
build
214107
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0b27d38e5a8da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{9C43F82E-14D8-11EF-8FD7-42B5B583A19B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006dd375db7411044b87316e7a135016a6000000000200000000001066000000010000200000003191c9ab82d0abeea5ce09d3a26cef1fa014b6dc47b2f05a597823b34c7e8262000000000e80000000020000200000001efb121c84375809ef91b5a7025934fdb4e25234fe11ffb9ab25218e70d1a111200000000665fd9e7df275bc72ce58292dc6ca7e58c8f04b7c538c5c7bbe80cd9f4b4f10400000007a065de70e5f58f0f0b0441c54b16c1287bbd9be97a87eedf1e92c1b425f95bf0ebe064b1ac58b1cb8fb6924a6e0395b86d4cbd0f0d58857bde34afcfe0eff20 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{757E9B61-14D8-11EF-8FD7-42B5B583A19B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10204552e5a8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "813545412" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006dd375db7411044b87316e7a135016a600000000020000000000106600000001000020000000dad7729820a101c31c295d756b0f3e621e00acb53a86bb5f86928c61f9ab6e52000000000e8000000002000020000000fafb96734bb60c89a32cd588036236b2d4c873d4802d8b852be38912e05c0b4820000000d202913ddd289db5716d50f038baf737c068b4dabaf99ea8aab91947264c9cff4000000014b959f91a2fc6a3600e0824e53010ed90eec44bb051ba1533d731e51c80b8426534c2dabe0f95ee8c208da992793b242404d3fe3afea5cdd2f34d941113b7e5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{5C0A9FE6-14D8-11EF-8FD7-42B5B583A19B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "813545412" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006dd375db7411044b87316e7a135016a600000000020000000000106600000001000020000000348e5b73c218d931bf387e666b56899a15afe618bb0769e2d5ee8f69e5d177e4000000000e8000000002000020000000e34de537c8e0af6eb528ab854548e4a5cf418be80fa96d7cfdac16dd1b85e5822000000023cfa2cd873829a983ed6e2bf24aeef8d89ed21f3217a955239255e3845f91e140000000bae8eab7a0a481d23723288c13ae3d9908f8abe28839d2566e3f37060f4e0e44b8ec216d3e2f9ff37ec0043c46614d2493f9ca4d351cd4338a1c84a349e280fe iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31107301" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{826E408E-14D8-11EF-8FD7-42B5B583A19B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7078395fe5a8da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00084d31e5a8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0e54b45e5a8da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006dd375db7411044b87316e7a135016a600000000020000000000106600000001000020000000ff9262912e1d311b256f2845a8e1e9b46eef7a398c355187dc372e6cf089db0c000000000e8000000002000020000000dcb03c5c5b34c56c26dad1a5c6163ab7a578b3ec3cb8334c14b1046822d99f68200000009a0c7b93666186bca8837895f2ed3a7b7ab263f7168836640548b11fdcd87f0340000000e80c2413e74649f7cf1d8c5b6afddb99ec375033c405d5ef3b38c9da56a6c8ed9ed7b613e5570d6c051a41f6002b7c7d2d6276ea27aa32069ada63b0eb6d7e52 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31107301" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006dd375db7411044b87316e7a135016a6000000000200000000001066000000010000200000002ec2002fb54104f54a6896b6a5d2e972cdfbe2afe2eb102aae5478e310aa2694000000000e800000000200002000000079facc7abba8fb361285749afec4f265bebbebb07a01d1792a2f921eeca872f6200000006c2e4388d736800e70080afa9357414cf432237bc69882f70ddfc2982866150740000000ec4c1c4d27059d7d410dddd9866a3836b29abd323362fe34884ab31ab85c8f83b7189929beb90af0428fc3d3524978e4d5c351f2d5abf9457bed66feca9617f7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exepid process 4092 iexplore.exe 2680 iexplore.exe 3616 iexplore.exe 4292 iexplore.exe 4312 iexplore.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
Processes:
iexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEpid process 4092 iexplore.exe 4092 iexplore.exe 1920 IEXPLORE.EXE 1920 IEXPLORE.EXE 2680 iexplore.exe 2680 iexplore.exe 4808 IEXPLORE.EXE 4808 IEXPLORE.EXE 3616 iexplore.exe 3616 iexplore.exe 1636 IEXPLORE.EXE 1636 IEXPLORE.EXE 4292 iexplore.exe 4292 iexplore.exe 1980 IEXPLORE.EXE 1980 IEXPLORE.EXE 4312 iexplore.exe 4312 iexplore.exe 4208 IEXPLORE.EXE 4208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exedescription pid process target process PID 4092 wrote to memory of 1920 4092 iexplore.exe IEXPLORE.EXE PID 4092 wrote to memory of 1920 4092 iexplore.exe IEXPLORE.EXE PID 4092 wrote to memory of 1920 4092 iexplore.exe IEXPLORE.EXE PID 2680 wrote to memory of 4808 2680 iexplore.exe IEXPLORE.EXE PID 2680 wrote to memory of 4808 2680 iexplore.exe IEXPLORE.EXE PID 2680 wrote to memory of 4808 2680 iexplore.exe IEXPLORE.EXE PID 3616 wrote to memory of 1636 3616 iexplore.exe IEXPLORE.EXE PID 3616 wrote to memory of 1636 3616 iexplore.exe IEXPLORE.EXE PID 3616 wrote to memory of 1636 3616 iexplore.exe IEXPLORE.EXE PID 4292 wrote to memory of 1980 4292 iexplore.exe IEXPLORE.EXE PID 4292 wrote to memory of 1980 4292 iexplore.exe IEXPLORE.EXE PID 4292 wrote to memory of 1980 4292 iexplore.exe IEXPLORE.EXE PID 4312 wrote to memory of 4208 4312 iexplore.exe IEXPLORE.EXE PID 4312 wrote to memory of 4208 4312 iexplore.exe IEXPLORE.EXE PID 4312 wrote to memory of 4208 4312 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\5333a8028037aa7f930852656ebe1ef5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5333a8028037aa7f930852656ebe1ef5_JaffaCakes118.exe"1⤵PID:5068
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:4480
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4092 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1920
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2680 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4808
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3616 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1636
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4292 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1980
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4312 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5f239d3b86b93fa461b08a22d16cee404
SHA1df82135c6a1cf59848842ae7803ce0312c6f2fa7
SHA25663ffe472fc06a86239c25089ba20f8e885e356163e3a14af4ef4a4de8cb61f79
SHA512542750aa959bfde4f4184e53589b50111f46ff20e985ce793716ee8340d5c3905398dee12994bf34a323a92020f1a543baaea2f501db14218623158a7b80a336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_B381A9DE1A99F00B76BC46CB1F8CCB60
Filesize472B
MD5284016b33a7b1b219f58f9f93512fb59
SHA18cbedeee459337071241371143b0e33c4798cb62
SHA256f80c16ba20e4abec474b3e5c336255f4f8e3add5f0d11bd2049b5bb6c508da8b
SHA512f8af7b6c34d3d3a39c58756ef687c389115eab07d68bb89546c38e13f760989945ed525d1ed8b0a1e113f570f8f1bbd5536ddcf19b1a228cccf2da918dec2729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5815d13cf4223ee0b231c6f680b4e485b
SHA1b98d50042193a7a71c1818904d69b9518cad7a7f
SHA256533a8eacae0116b1c11fbf56881bdcc91d88c413550f3cc74c0695fe00acb3fc
SHA5121c21155acbf100d95a5677ca6ec7a21921a7aad969700875524f27fc52506995f94f145412eb5a5b8e8395a591e0da2bd58741c42c88a99fed474df9a0ce201c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5755dee21e6cd813f6cf2e4e469ccd6d6
SHA10d14d2862080ee5669c2519440561289214a0b60
SHA2561f12d5dd6d98f6a78e72aa5088fbb8bbe1da6309f69e4858a2468c604d55151c
SHA512df374c1e4a39b6f343912da0bdb0f0ddc3418d90973a9a3323d88ed7dd73981bd4445ff1f0bfb65af38f555814b864061523a158b4e672d7d8ee408eb4f3c823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_B381A9DE1A99F00B76BC46CB1F8CCB60
Filesize402B
MD563fdd1fb6a54b6aa8d1499b8b9fb26b8
SHA14e9645eed3e0957b483787b96b594742bc7c3b5b
SHA256fb51c5d19999bbe410e0686af9a7b1b8fc404cfcc446002e209e0edc8b1effd9
SHA512fe94ea3feedffc1bda9f00587704e0140bb5b59c9dc8e5a50c9c207af9b9ff8f383f5a13a34b94a8eb3ec3bf87cc9a36ded49b06bf3e8d0c5e24a0038b7eb509
-
Filesize
6KB
MD54c9acf280b47cef7def3fc91a34c7ffe
SHA1c32bb847daf52117ab93b723d7c57d8b1e75d36b
SHA2565f9fc5b3fbddf0e72c5c56cdcfc81c6e10c617d70b1b93fbe1e4679a8797bff7
SHA512369d5888e0d19b46cb998ea166d421f98703aec7d82a02dc7ae10409aec253a7ce099d208500b4e39779526219301c66c2fd59fe92170b324e70cf63ce2b429c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ED9UQUDY\googlelogo_color_150x54dp[1].png
Filesize3KB
MD59d73b3aa30bce9d8f166de5178ae4338
SHA1d0cbc46850d8ed54625a3b2b01a2c31f37977e75
SHA256dbef5e5530003b7233e944856c23d1437902a2d3568cdfd2beaf2166e9ca9139
SHA5128e55d1677cdbfe9db6700840041c815329a57df69e303adc1f994757c64100fe4a3a17e86ef4613f4243e29014517234debfbcee58dab9fc56c81dd147fdc058
-
Filesize
16KB
MD5ebca2943351aa515cc1ba9ba683f4fd8
SHA1457fd58402b86001a7d328fb45b61d92fef4ebb1
SHA256ba525d3f032fffc15a28b3b51e6c3acaa29a408c2081d3afabe5470cc972546f
SHA512609a7502e9b77068c1da3a8ac785584841a60cf2ad820714cceb8426f6a08ae62b7e7a10acf9275ae2284794b291a9a1022516a6ebe4ac42764e27926619bfcf