Analysis
-
max time kernel
137s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29-05-2024 14:19
Static task
static1
Behavioral task
behavioral1
Sample
810868f9c0d4413c1079da093c5d4447_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
810868f9c0d4413c1079da093c5d4447_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
810868f9c0d4413c1079da093c5d4447_JaffaCakes118.html
-
Size
450KB
-
MD5
810868f9c0d4413c1079da093c5d4447
-
SHA1
dd9b657a9b5e21a635622eac2e0ef446149f6490
-
SHA256
b242fd9387bd6899cee0c476f591e9511055022ae8815f451ad72a599bce767a
-
SHA512
63c4f43680278c488e5c78db22c8133377796df95a6b648860c43538dcf452398d9550f8cc8fa3baf8e8c900f75a38a53bcb16c4486a0ce0f04b46a4030351b0
-
SSDEEP
6144:SpsMYod+X3oI+YesMYod+X3oI+YosMYod+X3oI+YAsMYod+X3oI+YQ:c5d+X325d+X3s5d+X385d+X3+
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
Processes:
svchost.exesvchost.exeDesktopLayer.exesvchost.exesvchost.exeDesktopLayer.exepid process 2628 svchost.exe 2744 svchost.exe 2812 DesktopLayer.exe 1920 svchost.exe 1436 svchost.exe 1596 DesktopLayer.exe -
Loads dropped DLL 5 IoCs
Processes:
IEXPLORE.EXEsvchost.exepid process 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2628 svchost.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\svchost.exe upx behavioral1/memory/2628-6-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2628-10-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2812-24-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2812-22-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2744-19-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1596-606-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 9 IoCs
Processes:
svchost.exesvchost.exesvchost.exesvchost.exedescription ioc process File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px11DC.tmp svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px11CC.tmp svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\pxAFDF.tmp svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\pxAFEE.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7C0306F1-1DC6-11EF-910D-CE7E212FECBD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff5600000000000000dc04000065020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff6f00000019000000f50400007e020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60242590d3b1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423154248" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000005b968cb62b65f41a9635a9e3ce3c0f10000000002000000000010660000000100002000000019487d0d349ba3fcade505bc268af07b17e060a470e31cdc8d4d093f8494cfac000000000e8000000002000020000000cd404a74d99b0ac47fe5b5395236552d03885dcdac2bfdee5b8352bd51e3d28b20000000e044329a12844eb58bb038a712748e5e5d4b46ed40cf2a6f687106ba6f09198540000000645e70571adfc62730f7316895df48847b9bd92ee197af66b02aac02e58b0a5753e177b97c4d79e33385eec6d7a5a66ac29bbb9f7317ead7a2dc694b7436ff23 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
svchost.exeDesktopLayer.exesvchost.exeDesktopLayer.exepid process 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2812 DesktopLayer.exe 2812 DesktopLayer.exe 2812 DesktopLayer.exe 2812 DesktopLayer.exe 1436 svchost.exe 1436 svchost.exe 1436 svchost.exe 1436 svchost.exe 1596 DesktopLayer.exe 1596 DesktopLayer.exe 1596 DesktopLayer.exe 1596 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
iexplore.exepid process 2220 iexplore.exe 2220 iexplore.exe 2220 iexplore.exe 2220 iexplore.exe 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 24 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEpid process 2220 iexplore.exe 2220 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2220 iexplore.exe 2220 iexplore.exe 2220 iexplore.exe 2220 iexplore.exe 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE 2220 iexplore.exe 2220 iexplore.exe 2220 iexplore.exe 2220 iexplore.exe 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 60 IoCs
Processes:
iexplore.exeIEXPLORE.EXEsvchost.exesvchost.exeDesktopLayer.exesvchost.exesvchost.exeDesktopLayer.exedescription pid process target process PID 2220 wrote to memory of 2372 2220 iexplore.exe IEXPLORE.EXE PID 2220 wrote to memory of 2372 2220 iexplore.exe IEXPLORE.EXE PID 2220 wrote to memory of 2372 2220 iexplore.exe IEXPLORE.EXE PID 2220 wrote to memory of 2372 2220 iexplore.exe IEXPLORE.EXE PID 2372 wrote to memory of 2628 2372 IEXPLORE.EXE svchost.exe PID 2372 wrote to memory of 2628 2372 IEXPLORE.EXE svchost.exe PID 2372 wrote to memory of 2628 2372 IEXPLORE.EXE svchost.exe PID 2372 wrote to memory of 2628 2372 IEXPLORE.EXE svchost.exe PID 2372 wrote to memory of 2744 2372 IEXPLORE.EXE svchost.exe PID 2372 wrote to memory of 2744 2372 IEXPLORE.EXE svchost.exe PID 2372 wrote to memory of 2744 2372 IEXPLORE.EXE svchost.exe PID 2372 wrote to memory of 2744 2372 IEXPLORE.EXE svchost.exe PID 2744 wrote to memory of 2496 2744 svchost.exe iexplore.exe PID 2744 wrote to memory of 2496 2744 svchost.exe iexplore.exe PID 2744 wrote to memory of 2496 2744 svchost.exe iexplore.exe PID 2744 wrote to memory of 2496 2744 svchost.exe iexplore.exe PID 2628 wrote to memory of 2812 2628 svchost.exe DesktopLayer.exe PID 2628 wrote to memory of 2812 2628 svchost.exe DesktopLayer.exe PID 2628 wrote to memory of 2812 2628 svchost.exe DesktopLayer.exe PID 2628 wrote to memory of 2812 2628 svchost.exe DesktopLayer.exe PID 2812 wrote to memory of 2432 2812 DesktopLayer.exe iexplore.exe PID 2812 wrote to memory of 2432 2812 DesktopLayer.exe iexplore.exe PID 2812 wrote to memory of 2432 2812 DesktopLayer.exe iexplore.exe PID 2812 wrote to memory of 2432 2812 DesktopLayer.exe iexplore.exe PID 2220 wrote to memory of 2880 2220 iexplore.exe IEXPLORE.EXE PID 2220 wrote to memory of 2880 2220 iexplore.exe IEXPLORE.EXE PID 2220 wrote to memory of 2880 2220 iexplore.exe IEXPLORE.EXE PID 2220 wrote to memory of 2880 2220 iexplore.exe IEXPLORE.EXE PID 2220 wrote to memory of 2592 2220 iexplore.exe IEXPLORE.EXE PID 2220 wrote to memory of 2592 2220 iexplore.exe IEXPLORE.EXE PID 2220 wrote to memory of 2592 2220 iexplore.exe IEXPLORE.EXE PID 2220 wrote to memory of 2592 2220 iexplore.exe IEXPLORE.EXE PID 2372 wrote to memory of 1920 2372 IEXPLORE.EXE svchost.exe PID 2372 wrote to memory of 1920 2372 IEXPLORE.EXE svchost.exe PID 2372 wrote to memory of 1920 2372 IEXPLORE.EXE svchost.exe PID 2372 wrote to memory of 1920 2372 IEXPLORE.EXE svchost.exe PID 2372 wrote to memory of 1436 2372 IEXPLORE.EXE svchost.exe PID 2372 wrote to memory of 1436 2372 IEXPLORE.EXE svchost.exe PID 2372 wrote to memory of 1436 2372 IEXPLORE.EXE svchost.exe PID 2372 wrote to memory of 1436 2372 IEXPLORE.EXE svchost.exe PID 1920 wrote to memory of 1596 1920 svchost.exe DesktopLayer.exe PID 1920 wrote to memory of 1596 1920 svchost.exe DesktopLayer.exe PID 1920 wrote to memory of 1596 1920 svchost.exe DesktopLayer.exe PID 1920 wrote to memory of 1596 1920 svchost.exe DesktopLayer.exe PID 1436 wrote to memory of 2108 1436 svchost.exe iexplore.exe PID 1436 wrote to memory of 2108 1436 svchost.exe iexplore.exe PID 1436 wrote to memory of 2108 1436 svchost.exe iexplore.exe PID 1436 wrote to memory of 2108 1436 svchost.exe iexplore.exe PID 1596 wrote to memory of 1060 1596 DesktopLayer.exe iexplore.exe PID 1596 wrote to memory of 1060 1596 DesktopLayer.exe iexplore.exe PID 1596 wrote to memory of 1060 1596 DesktopLayer.exe iexplore.exe PID 1596 wrote to memory of 1060 1596 DesktopLayer.exe iexplore.exe PID 2220 wrote to memory of 2168 2220 iexplore.exe IEXPLORE.EXE PID 2220 wrote to memory of 2168 2220 iexplore.exe IEXPLORE.EXE PID 2220 wrote to memory of 2168 2220 iexplore.exe IEXPLORE.EXE PID 2220 wrote to memory of 2168 2220 iexplore.exe IEXPLORE.EXE PID 2220 wrote to memory of 3060 2220 iexplore.exe IEXPLORE.EXE PID 2220 wrote to memory of 3060 2220 iexplore.exe IEXPLORE.EXE PID 2220 wrote to memory of 3060 2220 iexplore.exe IEXPLORE.EXE PID 2220 wrote to memory of 3060 2220 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\810868f9c0d4413c1079da093c5d4447_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2432
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2496
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1060
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2108
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:209931 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2592
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:603139 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2880
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:472079 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:3945480 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5bfe351d2690332a2a4bf62db6efcdb43
SHA115c6470baad7a27ebb6b9e8188cb2859e8ce4c9c
SHA25662d891240333b67d079ad310001fe288be6b220e9067e33d39a8a48a6752b0b8
SHA5129f99b3fe192241417b5872fdb2af87184e80d0923202577dd77ee5fc233d1b8d70ac723af96f416dbb09c14351e60b348c4a97524b65cd3b05e3d7f093bb2309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a93ae5b45ed0d6720074d43bd84255b0
SHA138058b8ae831bc35295b7f8db3b67ac81109e3fc
SHA2564e16f82a2e9d2a71267e849e7b252e087d2714c1b8fea55b632b1cc86fd45df7
SHA512382d59d3812c07628479fd0407ad310dde63390b02a09da6c52f3056d0f34286ea31022f2a0b33c2485e9917176b9bc7aea7ce7beee35ce7b5767be2acd7eefa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506339b7bd22ec77ebec98340151964b0
SHA15b2f213600114dd2837bf8ce55740bdb3f56be75
SHA256de5d35a53b6579a71e34ab56d2ff08f01cdc7656b65dd63c6a0a98504369e089
SHA512b3e1941fcec0818571467b93c6ede6f1ec345e43ee7984c96ed0be3ba84d1cabe6d4744957101f9648f79daca48a9ec4d1bef60bb12c1e655c5a34ee926d71c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdf92c6249ee5d6f4727d59289211323
SHA13cc0f1b45b0265654df236f0926604152dfba488
SHA256dcac1d00ad44fddca8e80736bfb5b3d53bc416f574582b4f7bc9237def8a8ace
SHA512878d16abb5f85a2bca8a68910c033b3a4eb396a80738a00bf855ce6ee4b900021baf6077665c8f57c0965fa66d4f8755a320f0e16ecb23da9ea7537ae216d61c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f0bc5294155ce8945e1baff5c88ccda
SHA14dccf07518a5e844fde97163bf896f4cc1c74988
SHA2562e0125a214bf66ba9052dfda817f7572efc90daa3d57ddabc29ccf1c9e46bd90
SHA51203dcb0423f8bd29bd46ad70f2ae5c1dd1b176ba5e0b008229e678a2ef38ecb21478d581b66960fdbdd14501642cb62d15ff6e6ed6ef9ed52d45b6948441b35ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50df9a6c213138d047accd93ffb1d7f28
SHA1e033b62ff16545037d1f98a52c9b5c0b9918bdb7
SHA256fc8720ef4c34d3db7b567518f248877bbf877736cbdaaf5a8c18f8ad90a94448
SHA512eb04abd4e187eba6dcc2ae912368b8846f13d26b2956646dfcee8bf88e3ad8176e0d03355ef7b5c1063715b3b049e272bd8771cae1e61c8447dd9ff0b488cead
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5614bd38542308cd1651b2c58c472ea72
SHA105bf3c9fd0675b59b87daa2ad37b981de38831f9
SHA256dc8287c5721f94692f33ea92ec7d21b01435c5e027b5e96caa62ec690aefdb29
SHA5127301c29c0f83c2a2799df54ad86b79199e68bba3dad456ee8e414b2b3f08e8a25e7ab3034036b07576ddc4b32e23740afd6fbb8805ebb557c9b106455aead94c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576b8cc623c7cbd04bf6582e873d6d84a
SHA1212781f1bbe3c292e769c699a2db861c39bae73f
SHA25653ac3d69f34668f2bd74f49f85e2e88844c4c79bf3a55c8eb5068507a2817388
SHA512b5846ef319614877c23cc5f1ec153e548ccfca20fa5f87c9efe68b6c695e553d75318c642a6c8241e630fa75f20512b88c52dcc68647845807a82e8cca3c5932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e51d0d3e08baa82c8847852f7bd6222
SHA11196ad148552cd37efa4b7a5a6ecf777f9c6a95a
SHA256e8e1e0c79e1d2f22625388b9842384b6e0c6778d8c0a8e24c76251b943e0845a
SHA51286519db81714147320630faa29ff5baa4260b4fe6954bc27574a9114ee90b8e269c41fa073cc301182da0847a373fd53e10261f54efcba0de2c8a7412b7199e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563a4ef009917d12c1194d7441bf7bc77
SHA133c5b7e97ec27fba918180a4891a80cbd036a03c
SHA256ada9c506014dc413282b970ba946e58d2564d833c22453bfdf2d1b456407b34d
SHA5121f5367b64caefa1b96d91bc490aaec8d164c01deefc763da4ef839a4c74314ed89eaf3a57a7c29471cebc12f49d9fce3b4419263c67d405fda7eaf784dba709a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5e86011a7d15ee660c6c3817b30702291
SHA1608ff5cf5d1ed5d5809f537dcf89762ff62922b0
SHA256e56a94e8b1aa381e5402abc54082c76543b0ff6b56ffe8ed6166561673d70afe
SHA5120c8004488157322dabf4d2722ca526cd319f40c9a65c74492968da33ce575121a0d734be2599aed51e1db32453f9998f1917b98fb5415ffbf1ad9d10db8870be
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a