Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 16:52
Static task
static1
Behavioral task
behavioral1
Sample
e990d78f4d2cbd5cd0faa5e092a2a685_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e990d78f4d2cbd5cd0faa5e092a2a685_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e990d78f4d2cbd5cd0faa5e092a2a685_JaffaCakes118.exe
-
Size
630KB
-
MD5
e990d78f4d2cbd5cd0faa5e092a2a685
-
SHA1
b9c3c68db24fa1ef971d7e51d25a1e062a32e7c7
-
SHA256
e2b3705e0d34fbc9018c81ddadf84689a93a9bd14c7fabf16aec2ba3024aa53d
-
SHA512
427ad3a3ba561726397e33bfa5a5ebf04de9e6d618c857e0ad6fb6a3ae950d9734c76dcb5b3a947104e1c8243d2f1b73800355fd1b07c65c267cf269041e9ec6
-
SSDEEP
12288:KlyotBCHI9jfx6/HfnOncchwBq0WG1c2obY7gdRlligwfWB+B2:eyoSIjMHfnYccy80WkociV
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 54 IoCs
resource yara_rule behavioral2/files/0x0009000000023481-73.dat modiloader_stage2 behavioral2/memory/5080-75-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral2/memory/4868-80-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral2/memory/4144-84-0x0000000000400000-0x00000000004C4000-memory.dmp modiloader_stage2 behavioral2/memory/2860-86-0x0000000000270000-0x0000000000334000-memory.dmp modiloader_stage2 behavioral2/memory/4144-87-0x0000000000400000-0x00000000004C4000-memory.dmp modiloader_stage2 behavioral2/memory/4868-92-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral2/memory/4144-88-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral2/memory/5080-93-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral2/memory/2452-100-0x0000000000F60000-0x0000000001024000-memory.dmp modiloader_stage2 behavioral2/memory/4352-102-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral2/memory/4144-103-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral2/memory/3432-106-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral2/memory/640-107-0x0000000000890000-0x0000000000954000-memory.dmp modiloader_stage2 behavioral2/memory/3432-109-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral2/memory/852-113-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral2/memory/4296-111-0x0000000000010000-0x00000000000D4000-memory.dmp modiloader_stage2 behavioral2/memory/1728-116-0x0000000000950000-0x0000000000A14000-memory.dmp modiloader_stage2 behavioral2/memory/4016-118-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral2/memory/4144-120-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral2/memory/4084-121-0x0000000000640000-0x0000000000704000-memory.dmp modiloader_stage2 behavioral2/memory/516-123-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral2/memory/4804-138-0x0000000000B20000-0x0000000000BE4000-memory.dmp modiloader_stage2 behavioral2/memory/3288-140-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral2/memory/5064-143-0x0000000000EA0000-0x0000000000F64000-memory.dmp modiloader_stage2 behavioral2/memory/3940-145-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral2/memory/4892-147-0x0000000000CA0000-0x0000000000D64000-memory.dmp modiloader_stage2 behavioral2/memory/4588-149-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral2/memory/3404-152-0x00000000005F0000-0x00000000006B4000-memory.dmp modiloader_stage2 behavioral2/memory/2480-154-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral2/memory/4296-157-0x0000000000590000-0x0000000000654000-memory.dmp modiloader_stage2 behavioral2/memory/2560-159-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral2/memory/2916-171-0x00000000002F0000-0x00000000003B4000-memory.dmp modiloader_stage2 behavioral2/memory/1448-173-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral2/memory/620-176-0x00000000002D0000-0x0000000000394000-memory.dmp modiloader_stage2 behavioral2/memory/3264-177-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral2/memory/3708-179-0x0000000000090000-0x0000000000154000-memory.dmp modiloader_stage2 behavioral2/memory/5080-183-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral2/memory/5008-186-0x00000000008F0000-0x00000000009B4000-memory.dmp modiloader_stage2 behavioral2/memory/4848-188-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral2/memory/4068-191-0x0000000000C20000-0x0000000000CE4000-memory.dmp modiloader_stage2 behavioral2/memory/3084-193-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral2/memory/3584-195-0x00000000004B0000-0x0000000000574000-memory.dmp modiloader_stage2 behavioral2/memory/1016-197-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral2/memory/3524-204-0x0000000000410000-0x00000000004D4000-memory.dmp modiloader_stage2 behavioral2/memory/2932-206-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral2/memory/4384-208-0x0000000000480000-0x0000000000544000-memory.dmp modiloader_stage2 behavioral2/memory/4548-210-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral2/memory/2560-213-0x0000000000320000-0x00000000003E4000-memory.dmp modiloader_stage2 behavioral2/memory/5008-215-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral2/memory/1624-223-0x0000000000DA0000-0x0000000000E64000-memory.dmp modiloader_stage2 behavioral2/memory/3644-227-0x0000000000D90000-0x0000000000E54000-memory.dmp modiloader_stage2 behavioral2/memory/916-232-0x0000000000FE0000-0x00000000010A4000-memory.dmp modiloader_stage2 behavioral2/memory/4528-239-0x0000000000C30000-0x0000000000CF4000-memory.dmp modiloader_stage2 -
Executes dropped EXE 26 IoCs
pid Process 5080 4.exe 4868 rejoice47.exe 4352 rejoice47.exe 3432 rejoice47.exe 852 rejoice47.exe 4016 rejoice47.exe 516 rejoice47.exe 3288 rejoice47.exe 3940 rejoice47.exe 4588 rejoice47.exe 2480 rejoice47.exe 2560 rejoice47.exe 1448 rejoice47.exe 3264 rejoice47.exe 5080 rejoice47.exe 4848 rejoice47.exe 3084 rejoice47.exe 1016 rejoice47.exe 2932 rejoice47.exe 4548 rejoice47.exe 5008 rejoice47.exe 4068 rejoice47.exe 1652 rejoice47.exe 2344 rejoice47.exe 2404 rejoice47.exe 5112 rejoice47.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e990d78f4d2cbd5cd0faa5e092a2a685_JaffaCakes118.exe -
Drops file in System32 directory 26 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File created C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe -
Suspicious use of SetThreadContext 26 IoCs
description pid Process procid_target PID 4868 set thread context of 4144 4868 rejoice47.exe 84 PID 4868 set thread context of 2860 4868 rejoice47.exe 85 PID 4352 set thread context of 2452 4352 rejoice47.exe 94 PID 3432 set thread context of 640 3432 rejoice47.exe 100 PID 852 set thread context of 4296 852 rejoice47.exe 103 PID 4016 set thread context of 1728 4016 rejoice47.exe 106 PID 516 set thread context of 4084 516 rejoice47.exe 109 PID 3288 set thread context of 4804 3288 rejoice47.exe 113 PID 3940 set thread context of 5064 3940 rejoice47.exe 115 PID 4588 set thread context of 4892 4588 rejoice47.exe 118 PID 2480 set thread context of 3404 2480 rejoice47.exe 120 PID 2560 set thread context of 4296 2560 rejoice47.exe 123 PID 1448 set thread context of 2916 1448 rejoice47.exe 125 PID 3264 set thread context of 620 3264 rejoice47.exe 128 PID 5080 set thread context of 3708 5080 rejoice47.exe 130 PID 4848 set thread context of 5008 4848 rejoice47.exe 133 PID 3084 set thread context of 4068 3084 rejoice47.exe 135 PID 1016 set thread context of 3584 1016 rejoice47.exe 138 PID 2932 set thread context of 3524 2932 rejoice47.exe 140 PID 4548 set thread context of 4384 4548 rejoice47.exe 142 PID 5008 set thread context of 2560 5008 rejoice47.exe 145 PID 4068 set thread context of 1624 4068 rejoice47.exe 147 PID 1652 set thread context of 3644 1652 rejoice47.exe 149 PID 2344 set thread context of 916 2344 rejoice47.exe 152 PID 2404 set thread context of 4528 2404 rejoice47.exe 154 PID 5112 set thread context of 3892 5112 rejoice47.exe 156 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe 4.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe 4.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupDel.bat 4.exe -
System Location Discovery: System Language Discovery 1 TTPs 42 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language calc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e990d78f4d2cbd5cd0faa5e092a2a685_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3400000034000000ba04000099020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1222176664" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff1a0000001a000000a00400007f020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1401551643" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31132139" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31132139" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{74493FA7-75DE-11EF-BFD9-5ED96FC588C3} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31132139" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff720000001a000000f80400007f020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1224207806" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31132139" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1224207806" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31132139" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1523270604" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433443351" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1282020556" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31132139" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1222176664" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff00000000000000008604000065020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 4924 IEXPLORE.EXE 4924 IEXPLORE.EXE 4924 IEXPLORE.EXE 4924 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 4924 IEXPLORE.EXE 4924 IEXPLORE.EXE 4924 IEXPLORE.EXE 4924 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 524 IEXPLORE.EXE 524 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 3312 IEXPLORE.EXE 3312 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 524 IEXPLORE.EXE 524 IEXPLORE.EXE 524 IEXPLORE.EXE 524 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 5068 IEXPLORE.EXE 5068 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2988 wrote to memory of 5080 2988 e990d78f4d2cbd5cd0faa5e092a2a685_JaffaCakes118.exe 82 PID 2988 wrote to memory of 5080 2988 e990d78f4d2cbd5cd0faa5e092a2a685_JaffaCakes118.exe 82 PID 2988 wrote to memory of 5080 2988 e990d78f4d2cbd5cd0faa5e092a2a685_JaffaCakes118.exe 82 PID 5080 wrote to memory of 4868 5080 4.exe 83 PID 5080 wrote to memory of 4868 5080 4.exe 83 PID 5080 wrote to memory of 4868 5080 4.exe 83 PID 4868 wrote to memory of 4144 4868 rejoice47.exe 84 PID 4868 wrote to memory of 4144 4868 rejoice47.exe 84 PID 4868 wrote to memory of 4144 4868 rejoice47.exe 84 PID 4868 wrote to memory of 4144 4868 rejoice47.exe 84 PID 4868 wrote to memory of 4144 4868 rejoice47.exe 84 PID 4868 wrote to memory of 2860 4868 rejoice47.exe 85 PID 4868 wrote to memory of 2860 4868 rejoice47.exe 85 PID 4868 wrote to memory of 2860 4868 rejoice47.exe 85 PID 5080 wrote to memory of 1064 5080 4.exe 86 PID 5080 wrote to memory of 1064 5080 4.exe 86 PID 5080 wrote to memory of 1064 5080 4.exe 86 PID 2860 wrote to memory of 2732 2860 IEXPLORE.EXE 88 PID 2860 wrote to memory of 2732 2860 IEXPLORE.EXE 88 PID 2860 wrote to memory of 2732 2860 IEXPLORE.EXE 88 PID 4144 wrote to memory of 4352 4144 calc.exe 93 PID 4144 wrote to memory of 4352 4144 calc.exe 93 PID 4144 wrote to memory of 4352 4144 calc.exe 93 PID 4352 wrote to memory of 2452 4352 rejoice47.exe 94 PID 4352 wrote to memory of 2452 4352 rejoice47.exe 94 PID 4352 wrote to memory of 2452 4352 rejoice47.exe 94 PID 2860 wrote to memory of 4924 2860 IEXPLORE.EXE 95 PID 2860 wrote to memory of 4924 2860 IEXPLORE.EXE 95 PID 2860 wrote to memory of 4924 2860 IEXPLORE.EXE 95 PID 4144 wrote to memory of 3432 4144 calc.exe 99 PID 4144 wrote to memory of 3432 4144 calc.exe 99 PID 4144 wrote to memory of 3432 4144 calc.exe 99 PID 3432 wrote to memory of 640 3432 rejoice47.exe 100 PID 3432 wrote to memory of 640 3432 rejoice47.exe 100 PID 3432 wrote to memory of 640 3432 rejoice47.exe 100 PID 2860 wrote to memory of 2212 2860 IEXPLORE.EXE 101 PID 2860 wrote to memory of 2212 2860 IEXPLORE.EXE 101 PID 2860 wrote to memory of 2212 2860 IEXPLORE.EXE 101 PID 4144 wrote to memory of 852 4144 calc.exe 102 PID 4144 wrote to memory of 852 4144 calc.exe 102 PID 4144 wrote to memory of 852 4144 calc.exe 102 PID 852 wrote to memory of 4296 852 rejoice47.exe 103 PID 852 wrote to memory of 4296 852 rejoice47.exe 103 PID 852 wrote to memory of 4296 852 rejoice47.exe 103 PID 852 wrote to memory of 4296 852 rejoice47.exe 103 PID 2860 wrote to memory of 2084 2860 IEXPLORE.EXE 104 PID 2860 wrote to memory of 2084 2860 IEXPLORE.EXE 104 PID 2860 wrote to memory of 2084 2860 IEXPLORE.EXE 104 PID 4144 wrote to memory of 4016 4144 calc.exe 105 PID 4144 wrote to memory of 4016 4144 calc.exe 105 PID 4144 wrote to memory of 4016 4144 calc.exe 105 PID 4016 wrote to memory of 1728 4016 rejoice47.exe 106 PID 4016 wrote to memory of 1728 4016 rejoice47.exe 106 PID 4016 wrote to memory of 1728 4016 rejoice47.exe 106 PID 4144 wrote to memory of 516 4144 calc.exe 108 PID 4144 wrote to memory of 516 4144 calc.exe 108 PID 4144 wrote to memory of 516 4144 calc.exe 108 PID 516 wrote to memory of 4084 516 rejoice47.exe 109 PID 516 wrote to memory of 4084 516 rejoice47.exe 109 PID 516 wrote to memory of 4084 516 rejoice47.exe 109 PID 2860 wrote to memory of 524 2860 IEXPLORE.EXE 110 PID 2860 wrote to memory of 524 2860 IEXPLORE.EXE 110 PID 2860 wrote to memory of 524 2860 IEXPLORE.EXE 110 PID 4144 wrote to memory of 3288 4144 calc.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\e990d78f4d2cbd5cd0faa5e092a2a685_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e990d78f4d2cbd5cd0faa5e092a2a685_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"6⤵
- Modifies Internet Explorer settings
PID:2452
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"6⤵PID:640
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:852 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"6⤵
- Modifies Internet Explorer settings
PID:4296
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"6⤵PID:1728
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:516 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"6⤵PID:4084
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3288 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"6⤵PID:4804
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3940 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"6⤵
- Modifies Internet Explorer settings
PID:5064
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4588 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"6⤵
- Modifies Internet Explorer settings
PID:4892
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2480 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"6⤵PID:3404
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2560 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"6⤵
- Modifies Internet Explorer settings
PID:4296
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1448 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"6⤵
- Modifies Internet Explorer settings
PID:2916
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3264 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"6⤵
- Modifies Internet Explorer settings
PID:620
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5080 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"6⤵
- Modifies Internet Explorer settings
PID:3708
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4848 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"6⤵
- Modifies Internet Explorer settings
PID:5008
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3084 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"6⤵PID:4068
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1016 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"6⤵
- Modifies Internet Explorer settings
PID:3584
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2932 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"6⤵
- Modifies Internet Explorer settings
PID:3524
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4548 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"6⤵
- Modifies Internet Explorer settings
PID:4384
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5008 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"6⤵
- Modifies Internet Explorer settings
PID:2560
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4068 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"6⤵
- Modifies Internet Explorer settings
PID:1624
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1652 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"6⤵PID:3644
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2344 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"6⤵
- Modifies Internet Explorer settings
PID:916
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2404 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"6⤵
- Modifies Internet Explorer settings
PID:4528
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5112 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"6⤵
- Modifies Internet Explorer settings
PID:3892
-
-
-
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:17410 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:17414 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4924
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:17420 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2212
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:17424 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2084
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:17432 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:524
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:17440 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2920
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:17448 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3312
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:17456 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5068
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:17464 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:1984
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:17472 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:4712
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:17484 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:4364
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:17494 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:3288
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:17508 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:1452
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupDel.bat""3⤵
- System Location Discovery: System Language Discovery
PID:1064
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD58ae64039d826b5cd7b18f19cd02448fc
SHA19fbbc25be9a768acc0f028a24aa8733f6ab4c80b
SHA256ff89096af7bf23fbabfdf635f6f5707fae6ce937326ba951bdc44abd89b0d175
SHA512f01616a7efb2a2a93430eb72bda046064150f9f8416d421c4f78fa947a2ac75a00ff01097336b53e605d7747a84f1b024381717ccfa5acdfd5bb47b7aaf1bb09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD533bac9325241193616461afd5a0deb0c
SHA1e78ed72996568bc9616f4d6b20403749252b4859
SHA256cb0b78d15b774b91ab6f6ef315a14f301b85b40122a72622818753212538f5b7
SHA5123054cbd1551e36a747fc4c7086d3cc484530ea13d44279b4f5f92d462d91d7e3322bb240edeedd517751c00949a6264b50322464e446290726fde18ac4eb2e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD589694405ac528ea23a265196699aaa24
SHA14b71f6cc3a5f49aafec3aa864013b25af7e4b4eb
SHA2565192128f057d1d23b81e86cbc33cc102979c8ddd92319acdf8c0c0f6a8daef29
SHA51245b0639ad42c4808c23983677168f23318e273d6b530f36a9d95d243eb99aabc203df2bd1ba2b4e499233a9af438303840fff7337640d739383b5158ed53056c
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
745KB
MD5969820935859646affcc1907072c1ce1
SHA114d341996340f3db5e2d57113e58fdddc8824cd6
SHA256993d46adceec70bd2e34e8bd4f3d4ef6b7ed998f11082523eb9387df7fbf3ebd
SHA512e7187f36609497119c67f5c9fc85e9ee643a8a321d0854627ebef7dbdd3d2555ac46d3b9385f3361e1e66b63fa4621fecbfc46e52c56f083d33efefb2ea1b80d
-
Filesize
16KB
MD59ffcf967410609eab508f254e7ca6aa2
SHA1061671a355104728137c16cdec077b7312545f36
SHA256a3ec8754d1131e7e3f9e35a5ea52257b5cae7686f3f4355da048ac16f4a30e98
SHA51211d215e25afe2eb70c54c54c6b4e3125382c842324889ffc15e1b9f0e333c04473e9a8eed6fbda0c09478693811ef46efe97a16d08209ef00496b98afd6b6973