Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 09:20
Static task
static1
Behavioral task
behavioral1
Sample
6e059dbd016f2891214b9eac5f73e233_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6e059dbd016f2891214b9eac5f73e233_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6e059dbd016f2891214b9eac5f73e233_JaffaCakes118.html
-
Size
459KB
-
MD5
6e059dbd016f2891214b9eac5f73e233
-
SHA1
ef12d8b1c465924475d5b79f05927d5e2458bc1f
-
SHA256
a37feb5304986df556232362f0523349f1d6d1bb3668e0486b7b8d1c11b1789c
-
SHA512
fca0ecb63c01a0ab5ad2a7853b34e0065c30eeb0dd32cbaf12684910bba788105a3cbb2b5066947760ba1a1629277deddb79846d7e558dc2e7c6a2f635c6c6b9
-
SSDEEP
6144:SttZsMYod+X3oI+YDsMYod+X3oI+YrsMYod+X3oI+YysMYod+X3oI+YQ:4tl5d+X3Z5d+X3x5d+X3O5d+X3+
Malware Config
Signatures
-
Executes dropped EXE 8 IoCs
Processes:
svchost.exeDesktopLayer.exeFP_AX_CAB_INSTALLER64.exesvchost.exeDesktopLayer.exesvchost.exesvchost.exeDesktopLayer.exepid process 2644 svchost.exe 2112 DesktopLayer.exe 896 FP_AX_CAB_INSTALLER64.exe 1980 svchost.exe 1324 DesktopLayer.exe 1748 svchost.exe 1664 svchost.exe 3012 DesktopLayer.exe -
Loads dropped DLL 6 IoCs
Processes:
IEXPLORE.EXEsvchost.exepid process 2224 IEXPLORE.EXE 2644 svchost.exe 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\svchost.exe upx behavioral1/memory/2644-8-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2112-18-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1748-186-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1664-195-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/3012-196-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 9 IoCs
Processes:
svchost.exesvchost.exesvchost.exesvchost.exedescription ioc process File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px256B.tmp svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px259A.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px1A64.tmp svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px258A.tmp svchost.exe -
Drops file in Windows directory 4 IoCs
Processes:
IEXPLORE.EXEdescription ioc process File opened for modification C:\Windows\INF\setupapi.app.log IEXPLORE.EXE File opened for modification C:\Windows\Downloaded Program Files\SET252D.tmp IEXPLORE.EXE File created C:\Windows\Downloaded Program Files\SET252D.tmp IEXPLORE.EXE File opened for modification C:\Windows\Downloaded Program Files\swflash64.inf IEXPLORE.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000138a4d9632cd8e448fdd0ac30ae92d770000000002000000000010660000000100002000000087e43c268272d76117856427a1de05d214818a3499310ec3bc7a60fb921d7465000000000e8000000002000020000000ccf7ab80e9bd40ca87684c00fbfd01837deb89dcb439bab518befa365fdc20ab2000000097f759e26836669ecdf0feba5101a3c2566711da7fe0f2e986a478a3d2d6d81840000000c752825142e1c0be6a76278cb468cb74a95926013e40bce92266415e09206a06ef77a73c2ead0299cc4a0317830203dab110084e524c0fef12af6f51ca619d9f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff5600000000000000dc04000065020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff6f00000019000000f50400007e020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422704279" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D22C6F11-19AE-11EF-83FC-5267BFD3BAD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff00000000000000008604000065020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff19000000190000009f0400007e020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0240698bbadda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
Processes:
DesktopLayer.exeFP_AX_CAB_INSTALLER64.exeDesktopLayer.exesvchost.exeDesktopLayer.exepid process 2112 DesktopLayer.exe 2112 DesktopLayer.exe 2112 DesktopLayer.exe 2112 DesktopLayer.exe 896 FP_AX_CAB_INSTALLER64.exe 1324 DesktopLayer.exe 1324 DesktopLayer.exe 1324 DesktopLayer.exe 1324 DesktopLayer.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 1664 svchost.exe 3012 DesktopLayer.exe 3012 DesktopLayer.exe 3012 DesktopLayer.exe 3012 DesktopLayer.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
IEXPLORE.EXEdescription pid process Token: SeRestorePrivilege 2224 IEXPLORE.EXE Token: SeRestorePrivilege 2224 IEXPLORE.EXE Token: SeRestorePrivilege 2224 IEXPLORE.EXE Token: SeRestorePrivilege 2224 IEXPLORE.EXE Token: SeRestorePrivilege 2224 IEXPLORE.EXE Token: SeRestorePrivilege 2224 IEXPLORE.EXE Token: SeRestorePrivilege 2224 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
iexplore.exepid process 3028 iexplore.exe 3028 iexplore.exe 3028 iexplore.exe 3028 iexplore.exe 3028 iexplore.exe 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 26 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEpid process 3028 iexplore.exe 3028 iexplore.exe 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 3028 iexplore.exe 3028 iexplore.exe 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 3028 iexplore.exe 3028 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 3028 iexplore.exe 3028 iexplore.exe 3028 iexplore.exe 3028 iexplore.exe 3028 iexplore.exe 3028 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
iexplore.exeIEXPLORE.EXEsvchost.exeDesktopLayer.exeFP_AX_CAB_INSTALLER64.exesvchost.exeDesktopLayer.exesvchost.exesvchost.exeDesktopLayer.exedescription pid process target process PID 3028 wrote to memory of 2224 3028 iexplore.exe IEXPLORE.EXE PID 3028 wrote to memory of 2224 3028 iexplore.exe IEXPLORE.EXE PID 3028 wrote to memory of 2224 3028 iexplore.exe IEXPLORE.EXE PID 3028 wrote to memory of 2224 3028 iexplore.exe IEXPLORE.EXE PID 2224 wrote to memory of 2644 2224 IEXPLORE.EXE svchost.exe PID 2224 wrote to memory of 2644 2224 IEXPLORE.EXE svchost.exe PID 2224 wrote to memory of 2644 2224 IEXPLORE.EXE svchost.exe PID 2224 wrote to memory of 2644 2224 IEXPLORE.EXE svchost.exe PID 2644 wrote to memory of 2112 2644 svchost.exe DesktopLayer.exe PID 2644 wrote to memory of 2112 2644 svchost.exe DesktopLayer.exe PID 2644 wrote to memory of 2112 2644 svchost.exe DesktopLayer.exe PID 2644 wrote to memory of 2112 2644 svchost.exe DesktopLayer.exe PID 2112 wrote to memory of 2668 2112 DesktopLayer.exe iexplore.exe PID 2112 wrote to memory of 2668 2112 DesktopLayer.exe iexplore.exe PID 2112 wrote to memory of 2668 2112 DesktopLayer.exe iexplore.exe PID 2112 wrote to memory of 2668 2112 DesktopLayer.exe iexplore.exe PID 3028 wrote to memory of 2432 3028 iexplore.exe IEXPLORE.EXE PID 3028 wrote to memory of 2432 3028 iexplore.exe IEXPLORE.EXE PID 3028 wrote to memory of 2432 3028 iexplore.exe IEXPLORE.EXE PID 3028 wrote to memory of 2432 3028 iexplore.exe IEXPLORE.EXE PID 2224 wrote to memory of 896 2224 IEXPLORE.EXE FP_AX_CAB_INSTALLER64.exe PID 2224 wrote to memory of 896 2224 IEXPLORE.EXE FP_AX_CAB_INSTALLER64.exe PID 2224 wrote to memory of 896 2224 IEXPLORE.EXE FP_AX_CAB_INSTALLER64.exe PID 2224 wrote to memory of 896 2224 IEXPLORE.EXE FP_AX_CAB_INSTALLER64.exe PID 2224 wrote to memory of 896 2224 IEXPLORE.EXE FP_AX_CAB_INSTALLER64.exe PID 2224 wrote to memory of 896 2224 IEXPLORE.EXE FP_AX_CAB_INSTALLER64.exe PID 2224 wrote to memory of 896 2224 IEXPLORE.EXE FP_AX_CAB_INSTALLER64.exe PID 896 wrote to memory of 2248 896 FP_AX_CAB_INSTALLER64.exe iexplore.exe PID 896 wrote to memory of 2248 896 FP_AX_CAB_INSTALLER64.exe iexplore.exe PID 896 wrote to memory of 2248 896 FP_AX_CAB_INSTALLER64.exe iexplore.exe PID 896 wrote to memory of 2248 896 FP_AX_CAB_INSTALLER64.exe iexplore.exe PID 3028 wrote to memory of 2824 3028 iexplore.exe IEXPLORE.EXE PID 3028 wrote to memory of 2824 3028 iexplore.exe IEXPLORE.EXE PID 3028 wrote to memory of 2824 3028 iexplore.exe IEXPLORE.EXE PID 3028 wrote to memory of 2824 3028 iexplore.exe IEXPLORE.EXE PID 2224 wrote to memory of 1980 2224 IEXPLORE.EXE svchost.exe PID 2224 wrote to memory of 1980 2224 IEXPLORE.EXE svchost.exe PID 2224 wrote to memory of 1980 2224 IEXPLORE.EXE svchost.exe PID 2224 wrote to memory of 1980 2224 IEXPLORE.EXE svchost.exe PID 1980 wrote to memory of 1324 1980 svchost.exe DesktopLayer.exe PID 1980 wrote to memory of 1324 1980 svchost.exe DesktopLayer.exe PID 1980 wrote to memory of 1324 1980 svchost.exe DesktopLayer.exe PID 1980 wrote to memory of 1324 1980 svchost.exe DesktopLayer.exe PID 2224 wrote to memory of 1748 2224 IEXPLORE.EXE svchost.exe PID 2224 wrote to memory of 1748 2224 IEXPLORE.EXE svchost.exe PID 2224 wrote to memory of 1748 2224 IEXPLORE.EXE svchost.exe PID 2224 wrote to memory of 1748 2224 IEXPLORE.EXE svchost.exe PID 1324 wrote to memory of 1280 1324 DesktopLayer.exe iexplore.exe PID 1324 wrote to memory of 1280 1324 DesktopLayer.exe iexplore.exe PID 1324 wrote to memory of 1280 1324 DesktopLayer.exe iexplore.exe PID 1324 wrote to memory of 1280 1324 DesktopLayer.exe iexplore.exe PID 1748 wrote to memory of 3012 1748 svchost.exe DesktopLayer.exe PID 1748 wrote to memory of 3012 1748 svchost.exe DesktopLayer.exe PID 1748 wrote to memory of 3012 1748 svchost.exe DesktopLayer.exe PID 1748 wrote to memory of 3012 1748 svchost.exe DesktopLayer.exe PID 2224 wrote to memory of 1664 2224 IEXPLORE.EXE svchost.exe PID 2224 wrote to memory of 1664 2224 IEXPLORE.EXE svchost.exe PID 2224 wrote to memory of 1664 2224 IEXPLORE.EXE svchost.exe PID 2224 wrote to memory of 1664 2224 IEXPLORE.EXE svchost.exe PID 1664 wrote to memory of 2920 1664 svchost.exe iexplore.exe PID 1664 wrote to memory of 2920 1664 svchost.exe iexplore.exe PID 1664 wrote to memory of 2920 1664 svchost.exe iexplore.exe PID 1664 wrote to memory of 2920 1664 svchost.exe iexplore.exe PID 3012 wrote to memory of 2800 3012 DesktopLayer.exe iexplore.exe
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6e059dbd016f2891214b9eac5f73e233_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2668
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ICD1.tmp\FP_AX_CAB_INSTALLER64.exeC:\Users\Admin\AppData\Local\Temp\ICD1.tmp\FP_AX_CAB_INSTALLER64.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://get3.adobe.com/flashplayer/update/activex4⤵PID:2248
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1280
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2800
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2920
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:209930 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2432
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275467 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:668681 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2312
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:996362 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:1324039 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5a6c1aa21123e83d150a9a0485cf6ea1d
SHA1b959568e7161ca55964d5f8ee4d6a56dd9ba44b0
SHA256140caab0f228f367a2a897582cefc83435e237e27e796e3b952b25deb034ef94
SHA5123f80a7ca8690eeb910b761a6d530c02e9fd1b1a94ae026f587c06474a4418dd7fc6b8aa2c9f037e7d4efcf4f700ba8e65c7efb298754506db62d82e64ce555d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb030f1ea8118916ffa6ed8dfe2acf73
SHA101d6a87717f130a99cf39a5c75aa4575f2b8c371
SHA256275c10788bce8171bd9a9ffbc3b23feb01a58a615abdf59e564cb3c852c3efea
SHA512cab836434df115254a9194e446bad8b48088f51887c36ac8a214c41c28be17bde87b4badaa2fc08941baa8f47c6e8f7d24354a99b95d5ece0b165f593d5b402d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5883d140ae682a93b717c0ebfb110e79c
SHA1cf040ae68b7ea9b287d976023e0887771b748b0e
SHA2564495e590142ef56f89adbe45963ff9ad2111fe303156ca6048c8bba2f2ffebd0
SHA512554ab9d03d4f0a67a37fac8398ac3ba7adf1915a48541a322def58a45f0f9de37c78bb1b0bba54479a2a38b064923c936aa02a6f409023c94e81c5a767fdab1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a5f4cfe24f61b74ceb00b135f1950f2
SHA11cbf0bc6ea0df79935167a76967a16f2bac85a2e
SHA256ce24de050678dc27bd78714ca822686ec573eba5373ec530933692aabd998341
SHA51246b031ee5fa177bcff6db70f706ad15e41baa43242ce0a876aa105bcfb574da44445fdfffe9fddd838f545f0707953c691d4a041894de278fb6bba72f1df263d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d92698d97c913cb20996525383bdab82
SHA10b4c86fbee65c12fc864760b37f22ffe4672cfdf
SHA25666fb8e906555539d67baf326512e42e62d6714cdf383e7f44f15709549f65c20
SHA512031af32d9659956533c3d4113b0f9093ffe3706126c607de52e17161889c7b1df474fadb799d420be94611b71179991da96c149455f86af34ad4e884e574ea47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfc92d88e595833ce86a30cf3dad18a1
SHA146a4a6db0116449992008bb550c177af38d776af
SHA2567407b47e245895c72e8de8f949c154510332f5f06c7f9e6e0353ecdc8ca693e3
SHA512d6aa361332dfb9ae8492e4f2423bb410794d72f54b849d2ea610c80bee957556665c537da41cf17cbd77f6d2540993c7481269776120265460a8852e5ebbca58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535cb909bb441cdb50c2fe61840e8a1a8
SHA1ecab71959388aa6c404800b88b41428b79c3f979
SHA256fc93b736868ae53109ec102a0cd9a31134cb186f6f3cbbe0d31a3d0a56c2d8a0
SHA51264364fba6a2873a091f5aa94f4783b68f44f590cd49adcf4f960a032aa54b1f755ae0ffee8f5435c9fcda94c35acfe58739ea33266f2b03c897219903c1697a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e187c9d97b4681e71e49f3b04a5e18f0
SHA1a7da8c0876c46c11a2fc698433f3298682c011d3
SHA25674274c8bcda3841c572ad4cfba6ccd7048abb6e32c7296b08df37c2a07eefe08
SHA512d680b1cddd485c798a8316d69b9ce87395933fc39ef84e4bebc27655268df19282db297ba1dde7a9a3f77817921e08a51c5de520f9822ac77c32f78ed84d9bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537c77d01e99239db369ee0b2e8d07301
SHA1314ab543d7fd45233a67a7a2175a4754006bf8a6
SHA256056a20ee88399f650e6b521b1cddd0becf667dd03400ec56671a3f0b27f9b970
SHA512b3dd5fac8b2ee2515efdde486220f4ed8843965c7283d85a975fc7683dba000defe793810e42f758bbdb6304d028851079530ceb1c1983162aea4a88bffc906b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57544ec5afc31ebf8fe1df16296633905
SHA178c0d1b93ea2f47d3f60b604c7412b28f33e1b31
SHA256daf7a0f701f02d43d6c446b260a61c4a487444025cfb699bc2bc56b66fb103e6
SHA512ee98b85dc67d1ef5c347519b20ce0105616c95ace9204b1699458384f8f70461b0f0c04ca37f534e7b56452b277c75ad5d187a63c07b247632a2c2a5a9866c3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c689fbb0574b9a3a92d7591667abd246
SHA1a41d7b99810ab1f98838b3da7b4b86696fa1e09b
SHA2568f3dc3e7be323ff5684b16578f6b333c9d80ab9bdec9d65dcf2216b9fbce6dbf
SHA512098e0f77c3c2ce5a7d44af521a56b8b7b1d75830d51dfa7ba868371f27a41b770f259091c5e0bcc2b53136a83ba792899162257ef6d1002fb528b42454e42922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fe641c4754eec87bf4aae5acac3a401
SHA11cca05a0e4690c8e802bbd133213c8505c106b9c
SHA25636867fe56d935607c6848df9ce18ef1583ebf6f2702f8a676558fb93412f5454
SHA512d580ae9ea9698d0f0f10cb753fb1d37d662926cbf0e34ff85613ca33224ce2d3ce5a94b38b1b9cc4bc090881ec8c0b046de8e4695d0b783629f79b85baefdef5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546c0e60d142ac09203dde5d1d30bd782
SHA1c55cefd0f0aa28184b6df6cdd1d52ac2d7906b2f
SHA2567e7009869e97a0a904f672b3c3a7e1a6a81f78da11e3c2bccd4c6502b584dd95
SHA512ecc0d3b9ae9ecb11544ef2af8cf5d475c4a4ce36442aeab5ee418e9a5acf0e0ce98f82fa8115ab16877955404ea6fd673b267c725199cf69f3fc7f344c1ce15b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599770f4b19404e281fee871b115d5e48
SHA14d08035f46f7fbf6a896f39402f9fff4850220ea
SHA2568b175f50b4917f19739e9ce5814edbcf59731a64ab4fcb2ec06021b0521524b1
SHA5121141f85a1b7418793d7ba08b20d0f2d13c7499105bf4c9e103de8fc59a9e9c80ba8cf7a3871fbf29c9221a29088a0b7e4dde0f42eb9f153ba759fb8400b0f48f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e5d4e12ee3af9d11b5d6ecd1ad4a8e4
SHA1ed8c023f6b98b2e91fef55e4b8c559499a866849
SHA2563e6eb760b590a076f73dd16cf92f1d0210e69e13a9dcddf55c4353351b014294
SHA5128cde4db4d6f691866052232235c9c5f63a83b1900fb262b55cf0ecd66cfdc5f71b5639c40c60f49beba48ff0d90d58a5081a0ae48d478a98ed7d23227352d8b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592c04677fa1ce5b480ab1059ff77bab4
SHA14ecba6d6c13ec87cb565d6f4d5d45e1682395ea3
SHA25684366476cac64b01f8358e8b3aacb034d0c0067c8c531a3b81a7264c07a0c5c1
SHA512688d5d63f7d27e2a1c5cc47828c078f4a96f255751faf83cb30975c567dfccee6631c8d3bc3d75175b7d57512dceb3f0648817dd0300e1b594bfe8b582c4b164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da261e17b1d041d44a583cec03b4268c
SHA129c4de7f6ed414b20fc9aa3466ecd85f8103c544
SHA25671a39b865df7b1994b051c2525ac264be7358ef91365122f97de66ccdc6888cc
SHA5126a2f79398fbb3c33187b09f113bb8a990c35be03cc0819af3fbbadd88ae1e0f832bd5c00484a4987eb9a7587718e1a6c6da5fde37f283f92ceb8368fca829b46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e3b1bed649a9c86a171479be9280a75
SHA1a5ba4e4665b10ec692c0bdea11071ec875105e18
SHA256ce5f22da83afee4450920ca75a89a388c686716e4afa1287d4bfc5c99a622968
SHA5129e83227f3788494d9b040c2a0e2dd5465ab55bd09094a197159fbe8f891d9c6b191b19b3946e1218031c849fcc9940b6bddea43ea026c7d00f6726e6008588ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c955cd1c3c5bfa3bcbdcf714b0182036
SHA16211c9122a7fe32b2e1dbb5cf468bc8347e6f083
SHA256cf74b78fd14aca8b2505617a48bac011c2f80b0383fa0289f016856185c9ead6
SHA51217393d06dbdc7e8378d09589d3b14822f951b4ff0e414201551acfd55eb9042fe3eafadca3c2fc87b2d459512b47c53f4385545dda179b7eb44de355889b2885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7379032aca870179a0fd171930adfb9
SHA1e069582be4dfcce3969e3d9e964d58755428c953
SHA2569f0439ff5565c448cc4ddd371edc482477b50bcbe5198d2fd2b3c2ae1a7544e0
SHA5124abe841470f74257a35498b8d4e3ff52849a5ed5d774b182483bf9b3c5f0ff0c52a60d04de592f6d74a38a699b2e46e4745f6e64113766cb61a188c8e724f60c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53e89a0e9a5ba0c7b13b22fa3a2fc85d3
SHA13e04cd34137824f24da2dd4ba8b36e21faa5962e
SHA256a60fc293951289cc425e994a36a61ca10af75d046dc8a5832f3434afdb3c8ec2
SHA512a80bc1125359090d5a035c2ebf49d7396219f4c91e6b929f0d29a246a964387ae88487e2e634d213c4034f2d85b3110434d5c3fc77a55fea04f9a907a1b72277
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPR7YYBV\swflash[1].cab
Filesize225KB
MD5b3e138191eeca0adcc05cb90bb4c76ff
SHA12d83b50b5992540e2150dfcaddd10f7c67633d2c
SHA256eea074db3f86fed73a36d9e6c734af8080a4d2364e817eecd5cb37cb9ec9dc0b
SHA51282b4c76201697d7d25f2e4f454aa0dd8d548cdfd3ebfa0dd91845536f74f470e57d66a73750c56409510d787ee2483839f799fef5d5a77972cd4435a157a21a4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
218B
MD560c0b6143a14467a24e31e887954763f
SHA177644b4640740ac85fbb201dbc14e5dccdad33ed
SHA25697ac49c33b06efc45061441a392a55f04548ee47dc48aa8a916de8d13dabec58
SHA5127032669715c068de67d85d5d00f201ee84bb6edac895559b2a248509024d6ce07c0494835c8ee802dbdbe1bc0b1fb7f4a07417ef864c04ebfaa556663dfd7c7f
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
757KB
MD547f240e7f969bc507334f79b42b3b718
SHA18ec5c3294b3854a32636529d73a5f070d5bcf627
SHA256c8c8cff5dc0a3f205e59f0bbfe30b6ade490c10b9ecc7043f264ec67ef9b6a11
SHA51210999161970b874db326becd51d5917f17fece7021e27b2c2dfbee42cb4e992c4d5dbeac41093a345ad098c884f6937aa941ec76fb0c9587e9470405ecb67161
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a