Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 06:32
Static task
static1
Behavioral task
behavioral1
Sample
6d9c4b46f5fc3e58dcc82054b78a4ebf_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6d9c4b46f5fc3e58dcc82054b78a4ebf_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6d9c4b46f5fc3e58dcc82054b78a4ebf_JaffaCakes118.html
-
Size
461KB
-
MD5
6d9c4b46f5fc3e58dcc82054b78a4ebf
-
SHA1
4b5bc855c3f89f30e5f96b95840f32066d3c3c1d
-
SHA256
ccb267dd586b86679850c1e1b1a901764d21038cbb00f5eb3c65e994dc881541
-
SHA512
95efe9f038e1cead0e50f9ab12289860147c0c6433f18ea6881b4d4f1dee2853f5ba6a7fba2cae644722ecb7cb72cb37ea8f7e01e647c3cab3d1cb714a0d411e
-
SSDEEP
6144:SeZsMYod+X3oI+Y3klUNsMYod+X3oI+Y4sMYod+X3oI+YGsMYod+X3oI+YQ:hl5d+X3v5d+X3I5d+X3i5d+X3+
Malware Config
Signatures
-
Executes dropped EXE 8 IoCs
Processes:
svchost.exeDesktopLayer.exesvchost.exeFP_AX_CAB_INSTALLER64.exesvchost.exeDesktopLayer.exesvchost.exeDesktopLayer.exepid process 2644 svchost.exe 2244 DesktopLayer.exe 1536 svchost.exe 2868 FP_AX_CAB_INSTALLER64.exe 2004 svchost.exe 1668 DesktopLayer.exe 1320 svchost.exe 804 DesktopLayer.exe -
Loads dropped DLL 6 IoCs
Processes:
IEXPLORE.EXEsvchost.exepid process 2176 IEXPLORE.EXE 2644 svchost.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\svchost.exe upx behavioral1/memory/2644-7-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2244-18-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1536-21-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1536-23-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1536-25-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2004-149-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 9 IoCs
Processes:
svchost.exesvchost.exesvchost.exesvchost.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px2F0C.tmp svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px1EB7.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px1F72.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px2EDD.tmp svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
Processes:
IEXPLORE.EXEdescription ioc process File opened for modification C:\Windows\INF\setupapi.app.log IEXPLORE.EXE File opened for modification C:\Windows\Downloaded Program Files\SET2E41.tmp IEXPLORE.EXE File created C:\Windows\Downloaded Program Files\SET2E41.tmp IEXPLORE.EXE File opened for modification C:\Windows\Downloaded Program Files\swflash64.inf IEXPLORE.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000051c2a0479bbc1c45bb93dc2c9d4d9e500000000002000000000010660000000100002000000033bc3377254653264fdee7c550fbe424058c57cb60a31005cf5df33dc6b669a5000000000e8000000002000020000000a2812f4c3944d7cdf7ea3f4c08730961a8d597a17af53e6fc9d7f11c68c03222900000002d3a6a6ebf93a39bf13efbd26fa741af76a456ea90556834036d554d379181a2314058302f3ddb1f611b5ce3fb7758348e41cd26fefd5334d8bbd60de500ee507f904722ecad16a87fe2f2d9c4df44bf6e5b370f735f996a4f281ff63a68e467a070a8fb047f7f0aab2d028d5969985c0b872bcaa0b9705cfbd3abf5a192bb8127ed3a66a33e28e8dcc025150eea7edc40000000475094e7b8557a26708b4802e001555cd7d9abce6d923e5be761d5b90f26205392c75b046d08bc93a67bda412ffda41c8e9e3714fedce127adc2a346809fb212 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff19000000190000009f0400007e020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff5600000000000000dc04000065020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff00000000000000008604000065020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422694213" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6266E001-1997-11EF-822E-56D57A935C49} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff6f00000019000000f50400007e020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000051c2a0479bbc1c45bb93dc2c9d4d9e500000000002000000000010660000000100002000000070c9c39d7e8389fb343d2c9bbc599bf243fe59c4c7cc6f15ae9c9b69215a647b000000000e8000000002000020000000d1044e07bf06cea7f67488f372abd2efe37152e26d9161bdc27099d7ffc83874200000009049636fb9b02217bb8d048e14c034c552d7d8a3d6f210d338b21679d0971272400000006992f6fe5e547f07fd192e1722218ce0f8b6939828fb518b0ddea5a30aa52ce9c17ce072d991c92b2059d7fd680b98f66cf7cf74f88bbfe3114e831f2e1e6f91 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9051e528a4adda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 17 IoCs
Processes:
DesktopLayer.exesvchost.exeFP_AX_CAB_INSTALLER64.exeDesktopLayer.exeDesktopLayer.exepid process 2244 DesktopLayer.exe 2244 DesktopLayer.exe 2244 DesktopLayer.exe 2244 DesktopLayer.exe 1536 svchost.exe 1536 svchost.exe 1536 svchost.exe 1536 svchost.exe 2868 FP_AX_CAB_INSTALLER64.exe 1668 DesktopLayer.exe 1668 DesktopLayer.exe 1668 DesktopLayer.exe 1668 DesktopLayer.exe 804 DesktopLayer.exe 804 DesktopLayer.exe 804 DesktopLayer.exe 804 DesktopLayer.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
IEXPLORE.EXEdescription pid process Token: SeRestorePrivilege 2176 IEXPLORE.EXE Token: SeRestorePrivilege 2176 IEXPLORE.EXE Token: SeRestorePrivilege 2176 IEXPLORE.EXE Token: SeRestorePrivilege 2176 IEXPLORE.EXE Token: SeRestorePrivilege 2176 IEXPLORE.EXE Token: SeRestorePrivilege 2176 IEXPLORE.EXE Token: SeRestorePrivilege 2176 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
iexplore.exepid process 1736 iexplore.exe 1736 iexplore.exe 1736 iexplore.exe 1736 iexplore.exe 1736 iexplore.exe 1736 iexplore.exe -
Suspicious use of SetWindowsHookEx 26 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEpid process 1736 iexplore.exe 1736 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 1736 iexplore.exe 1736 iexplore.exe 1932 IEXPLORE.EXE 1932 IEXPLORE.EXE 1736 iexplore.exe 1736 iexplore.exe 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 1736 iexplore.exe 1736 iexplore.exe 676 IEXPLORE.EXE 676 IEXPLORE.EXE 1736 iexplore.exe 1736 iexplore.exe 1736 iexplore.exe 1736 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
iexplore.exeIEXPLORE.EXEsvchost.exeDesktopLayer.exesvchost.exeFP_AX_CAB_INSTALLER64.exesvchost.exeDesktopLayer.exesvchost.exedescription pid process target process PID 1736 wrote to memory of 2176 1736 iexplore.exe IEXPLORE.EXE PID 1736 wrote to memory of 2176 1736 iexplore.exe IEXPLORE.EXE PID 1736 wrote to memory of 2176 1736 iexplore.exe IEXPLORE.EXE PID 1736 wrote to memory of 2176 1736 iexplore.exe IEXPLORE.EXE PID 2176 wrote to memory of 2644 2176 IEXPLORE.EXE svchost.exe PID 2176 wrote to memory of 2644 2176 IEXPLORE.EXE svchost.exe PID 2176 wrote to memory of 2644 2176 IEXPLORE.EXE svchost.exe PID 2176 wrote to memory of 2644 2176 IEXPLORE.EXE svchost.exe PID 2644 wrote to memory of 2244 2644 svchost.exe DesktopLayer.exe PID 2644 wrote to memory of 2244 2644 svchost.exe DesktopLayer.exe PID 2644 wrote to memory of 2244 2644 svchost.exe DesktopLayer.exe PID 2644 wrote to memory of 2244 2644 svchost.exe DesktopLayer.exe PID 2244 wrote to memory of 2676 2244 DesktopLayer.exe iexplore.exe PID 2244 wrote to memory of 2676 2244 DesktopLayer.exe iexplore.exe PID 2244 wrote to memory of 2676 2244 DesktopLayer.exe iexplore.exe PID 2244 wrote to memory of 2676 2244 DesktopLayer.exe iexplore.exe PID 1736 wrote to memory of 1932 1736 iexplore.exe IEXPLORE.EXE PID 1736 wrote to memory of 1932 1736 iexplore.exe IEXPLORE.EXE PID 1736 wrote to memory of 1932 1736 iexplore.exe IEXPLORE.EXE PID 1736 wrote to memory of 1932 1736 iexplore.exe IEXPLORE.EXE PID 2176 wrote to memory of 1536 2176 IEXPLORE.EXE svchost.exe PID 2176 wrote to memory of 1536 2176 IEXPLORE.EXE svchost.exe PID 2176 wrote to memory of 1536 2176 IEXPLORE.EXE svchost.exe PID 2176 wrote to memory of 1536 2176 IEXPLORE.EXE svchost.exe PID 1536 wrote to memory of 2444 1536 svchost.exe iexplore.exe PID 1536 wrote to memory of 2444 1536 svchost.exe iexplore.exe PID 1536 wrote to memory of 2444 1536 svchost.exe iexplore.exe PID 1536 wrote to memory of 2444 1536 svchost.exe iexplore.exe PID 1736 wrote to memory of 3032 1736 iexplore.exe IEXPLORE.EXE PID 1736 wrote to memory of 3032 1736 iexplore.exe IEXPLORE.EXE PID 1736 wrote to memory of 3032 1736 iexplore.exe IEXPLORE.EXE PID 1736 wrote to memory of 3032 1736 iexplore.exe IEXPLORE.EXE PID 2176 wrote to memory of 2868 2176 IEXPLORE.EXE FP_AX_CAB_INSTALLER64.exe PID 2176 wrote to memory of 2868 2176 IEXPLORE.EXE FP_AX_CAB_INSTALLER64.exe PID 2176 wrote to memory of 2868 2176 IEXPLORE.EXE FP_AX_CAB_INSTALLER64.exe PID 2176 wrote to memory of 2868 2176 IEXPLORE.EXE FP_AX_CAB_INSTALLER64.exe PID 2176 wrote to memory of 2868 2176 IEXPLORE.EXE FP_AX_CAB_INSTALLER64.exe PID 2176 wrote to memory of 2868 2176 IEXPLORE.EXE FP_AX_CAB_INSTALLER64.exe PID 2176 wrote to memory of 2868 2176 IEXPLORE.EXE FP_AX_CAB_INSTALLER64.exe PID 2868 wrote to memory of 2408 2868 FP_AX_CAB_INSTALLER64.exe iexplore.exe PID 2868 wrote to memory of 2408 2868 FP_AX_CAB_INSTALLER64.exe iexplore.exe PID 2868 wrote to memory of 2408 2868 FP_AX_CAB_INSTALLER64.exe iexplore.exe PID 2868 wrote to memory of 2408 2868 FP_AX_CAB_INSTALLER64.exe iexplore.exe PID 1736 wrote to memory of 676 1736 iexplore.exe IEXPLORE.EXE PID 1736 wrote to memory of 676 1736 iexplore.exe IEXPLORE.EXE PID 1736 wrote to memory of 676 1736 iexplore.exe IEXPLORE.EXE PID 1736 wrote to memory of 676 1736 iexplore.exe IEXPLORE.EXE PID 2176 wrote to memory of 2004 2176 IEXPLORE.EXE svchost.exe PID 2176 wrote to memory of 2004 2176 IEXPLORE.EXE svchost.exe PID 2176 wrote to memory of 2004 2176 IEXPLORE.EXE svchost.exe PID 2176 wrote to memory of 2004 2176 IEXPLORE.EXE svchost.exe PID 2004 wrote to memory of 1668 2004 svchost.exe DesktopLayer.exe PID 2004 wrote to memory of 1668 2004 svchost.exe DesktopLayer.exe PID 2004 wrote to memory of 1668 2004 svchost.exe DesktopLayer.exe PID 2004 wrote to memory of 1668 2004 svchost.exe DesktopLayer.exe PID 2176 wrote to memory of 1320 2176 IEXPLORE.EXE svchost.exe PID 2176 wrote to memory of 1320 2176 IEXPLORE.EXE svchost.exe PID 2176 wrote to memory of 1320 2176 IEXPLORE.EXE svchost.exe PID 2176 wrote to memory of 1320 2176 IEXPLORE.EXE svchost.exe PID 1668 wrote to memory of 948 1668 DesktopLayer.exe iexplore.exe PID 1668 wrote to memory of 948 1668 DesktopLayer.exe iexplore.exe PID 1668 wrote to memory of 948 1668 DesktopLayer.exe iexplore.exe PID 1668 wrote to memory of 948 1668 DesktopLayer.exe iexplore.exe PID 1320 wrote to memory of 804 1320 svchost.exe DesktopLayer.exe
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6d9c4b46f5fc3e58dcc82054b78a4ebf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2676
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2444
-
-
-
C:\Users\Admin\AppData\Local\Temp\ICD1.tmp\FP_AX_CAB_INSTALLER64.exeC:\Users\Admin\AppData\Local\Temp\ICD1.tmp\FP_AX_CAB_INSTALLER64.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://get3.adobe.com/flashplayer/update/activex4⤵PID:2408
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:948
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:804 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:332
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:275464 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1932
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:6435841 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3032
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:209940 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:676
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:603151 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5eafc754b325f9645b21ad7c8c6372a8a
SHA1c37134a449d4c3747bedfc78461ccaac85a3342a
SHA256175758f5dac95128ae55a163a51a83fda8603fe866876b78d6ead11403c09c23
SHA512e972e858f1976e471c09ae42b9f1c13090e84b1ac80eae03b8201eaa12813e24bcf2dbf6860859c8bae696a1b4f45d6331688b3ff5c28072d5fb0b7c2485b95e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54894cc7b8bca1e75276352e418a02f85
SHA1bd304d9ca915c857bbb64f2a34406b959a1ead77
SHA256ef31b828ab4a8f502edb27f08853e8254d0adf6ae331df584e30da2de30eb44a
SHA512cfb452b1cc93546c50b963bae66c3f515b79794234eb1f9eab3b0f95a51f33bcc8f889f5c2d5be9cf42f86f924cdd3765794b504274448f46322705261d136a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b9b37d5606395bf7a201e6a3c2b5358
SHA1d8c3e1a6a14b19c70c07ff4dc167e821c57996a6
SHA256572e8275d3f620be053758de1e32c4623db4df15f00c4195f71f3e5a87aff77a
SHA512527829980da46715f4ad6014522c94bc2bda2a406740a97a6b6ddb87e2dfbaa8cf5537d0e4b1955ede9fc59160a58b13aada4f6822fee580cb52bdddb144f444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f82bc8d84df60a97a71ece79597f4a0e
SHA11a9555451e01f6142b817c49d2b8389deb180964
SHA256c676df985128324c3ad6a6a8676752f31d5c5ec1785bafccb51a63f6546fa790
SHA5123c95187d2ea15ed209da321770c4228a340ccbc24fae765533cb53efea4d0711fdffe1212b626d8a0bd8d0903f7f0517458bbe3485abea56dace35e1cda8b5ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588e0f95804ad7e396c002fe1d0995926
SHA18040123b86dcf4d21cf93fb8195774867ddfe4d4
SHA2569365111297c7878b1510ad5d277b60a525bf44c0809dab877cbe6e5773e9bf24
SHA51275d2523f67a4137dd44267a9d022d0831979334d91cfbc8ecae3a856992efcf49cba39ae39745f0bd87f44bfaadb763c47576e87dd65be53df92fdf5661e0acf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5339ef916d7f9c24ef429528e658f0f1a
SHA17d245638a7931b91f2c2600b8deeaad6579a9b50
SHA256e6bf275cceb5ae65a7441580c8735d5bf6ec9c3411e38e64ef35ae49ba447431
SHA512b24b886c40b3d6c925128200d4d6bb59629772f8e3941b956296c12237189bf1e0b4923352eecbc98ab68d483fbcd937771465079e71c4ea337ba6398fc6499b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5227accad9837382b9a94843f4f5d84d6
SHA18efbca49e028a2b1c704e043e11b51d4cc86878d
SHA256210cd7ead8cf543385a8178cc1d9122b4e08d2f9e54728ca12cb3d4b77f32868
SHA5122922ee28f25a120095d8248f34c518d5b3cf6363b08f4475da59e2e3a44bc3eb402bfc8302e6fdd3076a8ab88e76ad71aab36cb70214e4b78bd1ac91f6c786d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56abc862e2183db91702b3829fcd307d6
SHA1b881e9f5412c1de46cca91b4ed7360d4084e409f
SHA256e001204e5272072ca5ade521950fc32c355bccb721c8ccfb6db5f2b22ddc8e06
SHA512229e9d302928af03ad1f3a03a0b8236e5b630e2f2a1b92d6c72655e5d5be35121ef14dbf6676349593c6051d1df32354afd59b0c51dab089110c6690e01b8e26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51df891538d893cc58226e18fa81a32d1
SHA1c9a84b2501d7a4afafb480e4674405c6045b791f
SHA25670798208df15f19c717048d33818c0e58b824a20fc7c3ddf979f7d2c28c6219f
SHA512eae2661d973bafb4b74c4b821a1c68659235f1735b6fa6fda8654d1754f98b45eefd1bf52f3cd8109e85645d99768c9fac496e5d898ef57c5ac454f6c77235c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe829932d96944d6f33a4053da736a9a
SHA12b0fbac8bb9216f97d229ad6234c81ebee3cbfef
SHA256806ef91751d1afa94250f30cd629e003c6df40ed8440a8cb436e72bf01c2515b
SHA51254681743b2a3c625c1a502252f29fdce51d05adbeea03ec9d101f8d873323b5735e5614551764a9a66f452eb606267afb2849775c46df0f3c97e64716040b958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59721d5a3faaa3d63dd26ef88802c86c3
SHA10a066cc5087d4f4d9e90c41d1247c359a3ba06ea
SHA25601d526f7632d8af068feea32139bd96aef2407cbbfc45c6101efcf7d0c18c744
SHA512e2916da285081901dd0b36045f25ed0ff743d3c3256e706316fcac45bb564909156abe3b6792c46fd0a8626aba2de71c10021e4f1390eea4e15e2dd06a1ae315
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a52f6bd5a1977baffd76197941e7723
SHA1ec505ed0b8c7136223ad5601e6c82a73fadb262d
SHA256e66e43f4f738c51d3e339d7029cb695a7267a7eacc1b4227debb35fd44146cb1
SHA51218459a34b306aa762ca6f3b1e5b1fedd80ed4d896b163f4b163b77e940450b0ead5f32b01e597f39549201e94e57ec30efdceb3f273eb9ace8ddf36e605ac1c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d1beaad6f45ff46c8b946d4445d1633
SHA119ce080a815335ae2a1222b647c366afb88acb11
SHA25605f6055693aa8095c7064aefae4df9f583dcc70a002a05e87c9785333533c926
SHA512290a8eb1c7bf8367de346c1499cb740380f3b68cad819416c92bb8ab6322dede1442247440381440cf6267b1274c4e7366f2f30c0a1c716ff6995d4ab1b185d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5059026fa2fc46085d078ccba74384b13
SHA11a319f6a66b673d8babeb50b2ca55662448847c8
SHA25694603d34c0fc5065b8c1b10444853251fcf8a779564de8c1cc7934cd19b99d31
SHA512b9f949ecb2cb71da4fed3c5645990958af6ae0e84998ca77df570e43058a8e166ed71a0e54c5b4d33bf1c5592ac280ff7d97b8fd5c805c63a1a8f782eca7979c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565c0dd30a9420e1341dd8c508988d171
SHA1ede86a3b1189c7dd78c98a49603df1e313e0999a
SHA25664947792e8a38ac2d2e863cf66fadba8b0afd537195b69a571842bbef9348d78
SHA51270ed65ca55c6e5fff444f3523f1333e13d64a7414c1aec31a456184b5342311f93697fdd640784bc616c65cb8ec830c409dd6d94df274671e6f008f587f0f8c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa6d6b32a54956a8a1efab8a7b53a123
SHA16dcc17061ecbddedd20466d9a7d60e105e7da67d
SHA256dd184f46f66b6b0c5d8890743a1c8dea4995a2998453c4ccdfcd9532eb111ef9
SHA51284267750ece86657d326b39d0ceaf87f38d60426dc4025455bdedabefd3e2e9b64f4b53862e12915222dad012ee47146e714959304e0457d943f1cd630d3e1fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5618fe5439c999ca0a1d56cb67afbaf75
SHA12d7029ac381755ea11dcde28b410d10e340e867d
SHA25614db9ff2fec1ee2ae1a408e12ef10580031bb3c4bd3befc3261773e26eef13f4
SHA51203496f564be48ddaf3de992f0ab7ea17e223b08f2d97154883b08a1507b7727adac56405b4a86e27e0b384e9dced1203a79fef964f3e1089010d3db5966765dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d98ff471a8f06a54b1e47fd46c0b930c
SHA1b0bfd0da502eb94b2f64aa092244901e30308121
SHA256737a2a6bb193c64f73859dccebb93fafe461209efef399fd48967ac684177f2a
SHA512c215aecbb0a4852e5e9b063d6e15f6f88bdf114aa42bc109514d7990924bdec6866cf03fe5f81432d24f9f19e3f3eb84ce3925a6150ba8b128ddbe126abcf910
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544a6f8d927d739da6cfe5507098f0496
SHA1f4b1fa226e5e9c3677ece8e1d658b370874bf80c
SHA256315ffe31776b011f9d5c7b1d2b41f0e19473d486560e7aabdf27515e59b58815
SHA51234221b046bdeb3254f4558279e28b599f533bc7eba35c999c58af3074072f2743cf308d8cff4e7f0de15d95c847cfa974cfff9b6706132d2202631575d09caf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f25ef9ff4b3d5b8cd39c5aa52d42bd35
SHA1e14a5b4cf3cb32c737f4bfb41b24afa91a1e9a31
SHA256f15cac507388bafcf67632aebe0b5852c5107218f83fdf39cbd252b37f4c2923
SHA512b900e838f345ba64651d455a2004fc429f91ae37da99d2d2cfa4b1726ab89ea7ad04ecc32f7977810653041a4b1034e5ad1b593af0aa920bb66d7f432c902aa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b317a598f1f4a37e7faeebe09a0774ed
SHA14698f7a50d51bd296ebbad20a96df3a63f5c89f6
SHA256ed0ef809e37324a544737ec1b1f9c580005d258bd3f77390997e49e95c7146bf
SHA512caad70fe61101f65753ea5dc1df40d1a0aa2f277ca3a3cd2f532233144642707d5c68349862de0e975cba5d6e63b19c9cc545305499891625312eb3ae0bfdd6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5085658e384308bb48a01040af5f82d87
SHA13c269b575e73842d3ad69a37561961d36d7915ad
SHA2565e3ac5c4b209c82dbe4d353e6fb4bf9acc6f630bad37c299e1647718c057d916
SHA512caedbd89ea6371397c7fc50e5468d0836fcea91dfcd2be541ff4cbfb5a47966f0f6983a5a6fb6c2a8459fff5ba004630f4fa1a38e1eb1af358f4b7fb7eb00c1e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\swflash[1].cab
Filesize225KB
MD5b3e138191eeca0adcc05cb90bb4c76ff
SHA12d83b50b5992540e2150dfcaddd10f7c67633d2c
SHA256eea074db3f86fed73a36d9e6c734af8080a4d2364e817eecd5cb37cb9ec9dc0b
SHA51282b4c76201697d7d25f2e4f454aa0dd8d548cdfd3ebfa0dd91845536f74f470e57d66a73750c56409510d787ee2483839f799fef5d5a77972cd4435a157a21a4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
218B
MD560c0b6143a14467a24e31e887954763f
SHA177644b4640740ac85fbb201dbc14e5dccdad33ed
SHA25697ac49c33b06efc45061441a392a55f04548ee47dc48aa8a916de8d13dabec58
SHA5127032669715c068de67d85d5d00f201ee84bb6edac895559b2a248509024d6ce07c0494835c8ee802dbdbe1bc0b1fb7f4a07417ef864c04ebfaa556663dfd7c7f
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
757KB
MD547f240e7f969bc507334f79b42b3b718
SHA18ec5c3294b3854a32636529d73a5f070d5bcf627
SHA256c8c8cff5dc0a3f205e59f0bbfe30b6ade490c10b9ecc7043f264ec67ef9b6a11
SHA51210999161970b874db326becd51d5917f17fece7021e27b2c2dfbee42cb4e992c4d5dbeac41093a345ad098c884f6937aa941ec76fb0c9587e9470405ecb67161
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a