Analysis
-
max time kernel
160s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 17:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe
Resource
win7-20240220-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe
-
Size
3KB
-
MD5
1bd3da46c80baa7ebf4b3c30170dda49
-
SHA1
b2f4083a9d95f2c291c293e230ca36ecbb7842a9
-
SHA256
e312981bde490e4c81643ff412179b873a5e8df826053289c8c62f9a3c315e57
-
SHA512
0aa51fc2bf26a448ac935235596c549dd4b35cec09602f575da90f005f1987eebe77503e3156e135578fd518737706783e1cc3790f8b567dcb4139e0819ea3b0
Score
1/10
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{87AB11AA-37CD-11EF-B9F7-5E2396FD2BC6} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{77B494C1-37CD-11EF-B9F7-5E2396FD2BC6} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{6FB6F4B3-37CD-11EF-B9F7-5E2396FD2BC6} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{67B6EBEA-37CD-11EF-B9F7-5E2396FD2BC6} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{7FB234C6-37CD-11EF-B9F7-5E2396FD2BC6} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{5529A355-37CD-11EF-B9F7-5E2396FD2BC6} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{97AFDCC7-37CD-11EF-B9F7-5E2396FD2BC6} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 1176 IEXPLORE.EXE 1176 IEXPLORE.EXE 4620 IEXPLORE.EXE 4620 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 5020 IEXPLORE.EXE 5020 IEXPLORE.EXE 4068 IEXPLORE.EXE 4068 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 4488 IEXPLORE.EXE 4488 IEXPLORE.EXE 1828 IEXPLORE.EXE 1828 IEXPLORE.EXE 5004 IEXPLORE.EXE 5004 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3176 wrote to memory of 1176 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 93 PID 3176 wrote to memory of 1176 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 93 PID 1176 wrote to memory of 3604 1176 IEXPLORE.EXE 98 PID 1176 wrote to memory of 3604 1176 IEXPLORE.EXE 98 PID 1176 wrote to memory of 3604 1176 IEXPLORE.EXE 98 PID 3176 wrote to memory of 2428 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 99 PID 3176 wrote to memory of 2428 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 99 PID 3176 wrote to memory of 4620 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 104 PID 3176 wrote to memory of 4620 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 104 PID 4620 wrote to memory of 1540 4620 IEXPLORE.EXE 105 PID 4620 wrote to memory of 1540 4620 IEXPLORE.EXE 105 PID 4620 wrote to memory of 1540 4620 IEXPLORE.EXE 105 PID 3176 wrote to memory of 3932 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 106 PID 3176 wrote to memory of 3932 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 106 PID 3176 wrote to memory of 2916 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 107 PID 3176 wrote to memory of 2916 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 107 PID 2916 wrote to memory of 1568 2916 IEXPLORE.EXE 108 PID 2916 wrote to memory of 1568 2916 IEXPLORE.EXE 108 PID 2916 wrote to memory of 1568 2916 IEXPLORE.EXE 108 PID 3176 wrote to memory of 4964 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 109 PID 3176 wrote to memory of 4964 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 109 PID 3176 wrote to memory of 5020 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 110 PID 3176 wrote to memory of 5020 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 110 PID 5020 wrote to memory of 1320 5020 IEXPLORE.EXE 111 PID 5020 wrote to memory of 1320 5020 IEXPLORE.EXE 111 PID 5020 wrote to memory of 1320 5020 IEXPLORE.EXE 111 PID 3176 wrote to memory of 2140 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 112 PID 3176 wrote to memory of 2140 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 112 PID 3176 wrote to memory of 4068 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 113 PID 3176 wrote to memory of 4068 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 113 PID 4068 wrote to memory of 732 4068 IEXPLORE.EXE 114 PID 4068 wrote to memory of 732 4068 IEXPLORE.EXE 114 PID 4068 wrote to memory of 732 4068 IEXPLORE.EXE 114 PID 3176 wrote to memory of 4548 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 115 PID 3176 wrote to memory of 4548 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 115 PID 3176 wrote to memory of 2344 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 116 PID 3176 wrote to memory of 2344 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 116 PID 2344 wrote to memory of 648 2344 IEXPLORE.EXE 117 PID 2344 wrote to memory of 648 2344 IEXPLORE.EXE 117 PID 2344 wrote to memory of 648 2344 IEXPLORE.EXE 117 PID 3176 wrote to memory of 4492 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 118 PID 3176 wrote to memory of 4492 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 118 PID 3176 wrote to memory of 4488 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 119 PID 3176 wrote to memory of 4488 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 119 PID 4488 wrote to memory of 2668 4488 IEXPLORE.EXE 120 PID 4488 wrote to memory of 2668 4488 IEXPLORE.EXE 120 PID 4488 wrote to memory of 2668 4488 IEXPLORE.EXE 120 PID 3176 wrote to memory of 4592 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 121 PID 3176 wrote to memory of 4592 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 121 PID 3176 wrote to memory of 1828 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 122 PID 3176 wrote to memory of 1828 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 122 PID 1828 wrote to memory of 4952 1828 IEXPLORE.EXE 123 PID 1828 wrote to memory of 4952 1828 IEXPLORE.EXE 123 PID 1828 wrote to memory of 4952 1828 IEXPLORE.EXE 123 PID 3176 wrote to memory of 5076 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 124 PID 3176 wrote to memory of 5076 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 124 PID 3176 wrote to memory of 5004 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 125 PID 3176 wrote to memory of 5004 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 125 PID 5004 wrote to memory of 1820 5004 IEXPLORE.EXE 126 PID 5004 wrote to memory of 1820 5004 IEXPLORE.EXE 126 PID 5004 wrote to memory of 1820 5004 IEXPLORE.EXE 126 PID 3176 wrote to memory of 2216 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 127 PID 3176 wrote to memory of 2216 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 127 PID 3176 wrote to memory of 2484 3176 1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe 128
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1bd3da46c80baa7ebf4b3c30170dda49_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://club.pchome.net/forum_1_15.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1176 CREDAT:17410 /prefetch:23⤵PID:3604
-
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
PID:2428
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://club.pchome.net/forum_1_15.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4620 CREDAT:17410 /prefetch:23⤵PID:1540
-
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:3932
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://club.pchome.net/forum_1_15.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:17410 /prefetch:23⤵PID:1568
-
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:4964
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://club.pchome.net/forum_1_15.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5020 CREDAT:17410 /prefetch:23⤵PID:1320
-
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
PID:2140
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://club.pchome.net/forum_1_15.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4068 CREDAT:17410 /prefetch:23⤵PID:732
-
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
PID:4548
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://club.pchome.net/forum_1_15.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:17410 /prefetch:23⤵PID:648
-
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:4492
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://club.pchome.net/forum_1_15.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4488 CREDAT:17410 /prefetch:23⤵PID:2668
-
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
PID:4592
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://club.pchome.net/forum_1_15.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1828 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
PID:4952
-
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
PID:5076
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://club.pchome.net/forum_1_15.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5004 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
PID:1820
-
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
PID:2216
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://club.pchome.net/forum_1_15.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2484 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2484 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
PID:4300
-
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3744 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:81⤵PID:4840