Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-06-2024 23:38
Behavioral task
behavioral1
Sample
046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe
-
Size
413KB
-
MD5
046997c4d35f39904d6fcf1d38952489
-
SHA1
079f088c70f2a10dd6e3371e5473b7057d50f7ac
-
SHA256
d7680f6572553bad5a5734d106e42aace4338b0a15ae584681481d3802b9eb8b
-
SHA512
2de152c36cfea35986cd56531dd3c640722abb44c9865cebad0dc9e8a077dbde94f3cf6153ed5a1e5b35cca13aef102cbc8da673e86da917983952a8aa3ddba4
-
SSDEEP
12288:/P6ys+NgzZhkDjhsrsSsQifn/9043t207pK4c:7BNUfkiQSK10YtHFK4c
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "1" 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\WINDOWS\system32\drivers\etc\hosts 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe File created C:\WINDOWS\system32\drivers\etc\hosts 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\msscp.reg 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msscp.reg 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\System\taobao.ico 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\System\taobao.ico 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\web\Inde.html 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe File created C:\Windows\web\Index.htm 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe File created C:\Windows\web\Index.html 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe File opened for modification C:\Windows\web\Index.htm 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe File opened for modification C:\Windows\web\Index.html 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TYPEDURLS 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.a585.com" 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Start Page = "http://www.a585.com" 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe -
Modifies registry class 53 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Pz\9 = "1" 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\Shell\ɾ³ý(&D)\Command\ = "Rundll32.exe" 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Pz\9 = "0" 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\Shell\ÖØÃüÃû(&M)\Command\ = "Rundll32.exe" 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\ShellFolder\HideFolderVerbs 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\DefaultIcon\ = "C:\\Program Files (x86)\\Internet Explorer\\IEXPLORE.EXE" 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\Shell\ÊôÐÔ(&R)\Command\ = "Rundll32.exe Shell32.dll,Control_RunDLL Inetcpl.cpl" 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\ = "ÌÔ±¦Íø£¡" 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\Shell\ɾ³ý(&D)\Command\ = "Rundll32.exe" 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\Shell\ÖØÃüÃû(&M)\Command\ = "Rundll32.exe" 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\Shell\ÊôÐÔ(&R) 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\ShellFolder\WantsParseDisplayName 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43} 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\Shell\ÊôÐÔ(&R) 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\Shell\ɾ³ý(&D)\Command 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\ShellFolder\Attributes = "0" 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\Shell\ÊôÐÔ(&R)\Command\ = "Rundll32.exe Shell32.dll,Control_RunDLL Inetcpl.cpl" 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\Shell\ÖØÃüÃû(&M)\Command 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\ShellFolder\HideOnDesktopPerUser 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\Shell\Open(&O)\Command 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\DefaultIcon\ = "C:\\Program Files (x86)\\Common Files\\System\\taobao.ico" 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\Shell\ÖØÃüÃû(&M) 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\Shell\ɾ³ý(&D)\Command 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\Shell\Open(&O) 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\Shell\Open(&O)\Command\ = "iexplore.exe C:\\WINDOWS\\Web\\index.htm" 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\Shell\ÖØÃüÃû(&M)\Command 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\Shell\ɾ³ý(&D) 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\ShellFolder 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42} 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\Shell 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\Shell\ɾ³ý(&D) 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\Shell\Open(&O)\ = "´ò¿ªÖ÷Ò³(&H)" 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\Shell\Open(&O)\Command 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\Shell\Open(&O) 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\ShellFolder\HideOnDesktopPerUser 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\Shell\ÊôÐÔ(&R)\Command 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\ShellFolder\HideFolderVerbs 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\Shell 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Pz 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\Shell\Open(&O)\Command\ = "iexplore.exe C:\\WINDOWS\\Web\\index.html" 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\Shell\Open(&O)\ = "´ò¿ªÌÔ±¦Íø(&T)" 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Pz\5 = "11423" 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\Shell\ÊôÐÔ(&R)\Command 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\ShellFolder\Attributes = "0" 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\ShellFolder\WantsParseDisplayName 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Pz\1 = "20240622" 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\ = "Internet Explorer" 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\DefaultIcon 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\Shell\ÖØÃüÃû(&M) 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\ShellFolder 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\DefaultIcon 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe -
Runs .reg file with regedit 2 IoCs
pid Process 2616 regedit.exe 2440 regedit.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2616 2664 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe 28 PID 2664 wrote to memory of 2616 2664 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe 28 PID 2664 wrote to memory of 2616 2664 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe 28 PID 2664 wrote to memory of 2616 2664 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe 28 PID 2664 wrote to memory of 2924 2664 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe 29 PID 2664 wrote to memory of 2924 2664 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe 29 PID 2664 wrote to memory of 2924 2664 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe 29 PID 2664 wrote to memory of 2924 2664 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe 29 PID 2924 wrote to memory of 2440 2924 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe 30 PID 2924 wrote to memory of 2440 2924 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe 30 PID 2924 wrote to memory of 2440 2924 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe 30 PID 2924 wrote to memory of 2440 2924 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe 30 PID 2924 wrote to memory of 2460 2924 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe 31 PID 2924 wrote to memory of 2460 2924 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe 31 PID 2924 wrote to memory of 2460 2924 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe 31 PID 2924 wrote to memory of 2460 2924 046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe 31 PID 2460 wrote to memory of 2496 2460 IEXPLORE.EXE 32 PID 2460 wrote to memory of 2496 2460 IEXPLORE.EXE 32 PID 2460 wrote to memory of 2496 2460 IEXPLORE.EXE 32 PID 2460 wrote to memory of 2496 2460 IEXPLORE.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Drops file in Drivers directory
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\regedit.exeC:\Windows\regedit.exe /S C:\Windows\system32\msscp.reg2⤵
- Runs .reg file with regedit
PID:2616
-
-
C:\Users\Admin\AppData\Local\Temp\046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\046997c4d35f39904d6fcf1d38952489_JaffaCakes118.exe2⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\regedit.exeC:\Windows\regedit.exe /S C:\Windows\system32\msscp.reg3⤵
- Runs .reg file with regedit
PID:2440
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" C:\Windows\web\Inde.html3⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" C:\Windows\web\Inde.html4⤵
- Modifies Internet Explorer settings
PID:2496
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5468fada123f5548ac87e57bae81f6782
SHA1edb8f012c25906e6afd8bf335b495e16c440243d
SHA256091c882bb307d57f2c7c42309e7ba8740130fef8c3ed772b0bc5e5505e37034d
SHA512635ec26c88c2394dd4f2a81b9aea8f429a91adfeb37ae34e51b03f3cf8e503c123c3685938f40cea07d6146e0c7113aadbe62fa528f1f6d8b995e617fd68a4aa
-
Filesize
3KB
MD58ebaaf110f51a5d473bf713e602cfe70
SHA191dda6b9145553391117ea584b1baa94d757d74c
SHA2569bb7d86f074b7941b97dadd516e7e53bc6304d11393bea53b0682df651e96fc3
SHA512af842df53c7bbccb8fda1c95d8a8bce9a68376c1754bc7105459e7d86b723baba62625ccf9c5c2bbf32b18aa915e5779cd739c71892b629ceb6400c9fbc9d856
-
Filesize
228B
MD52d06a424ad1c7611ea9caad93892ea26
SHA1a901e15c2ecea498f1ca8ffc5d5c32bd3f0169d8
SHA2568c19027357bcb3170b6844aec44cd4c143c7b795d5df52ff89426615010f715c
SHA5123199dffce9d7625d9e01d7a06c912d3629e5f3d98d3935763df6b323807d46f24a40876d78d5ae7f7ac83c90e498e7c4810d88993904dbca1036e8c06833ccdf