Overview
overview
7Static
static
3fe1c426cb9...18.exe
windows7-x64
3fe1c426cb9...18.exe
windows10-2004-x64
7$SYSDIR/Em...er.scr
windows7-x64
3$SYSDIR/Em...er.scr
windows10-2004-x64
3$TEMP/dospop.exe
windows7-x64
7$TEMP/dospop.exe
windows10-2004-x64
7tbu03852/dospop.dll
windows7-x64
6tbu03852/dospop.dll
windows10-2004-x64
6tbu03852/options.html
windows7-x64
3tbu03852/options.html
windows10-2004-x64
3tbu03852/s...g.html
windows7-x64
3tbu03852/s...g.html
windows10-2004-x64
3tbu03852/s...b.html
windows7-x64
3tbu03852/s...b.html
windows10-2004-x64
3tbu03852/tbhelper.dll
windows7-x64
3tbu03852/tbhelper.dll
windows10-2004-x64
3tbu03852/t...091.js
windows7-x64
3tbu03852/t...091.js
windows10-2004-x64
3tbu03852/u...ll.exe
windows7-x64
3tbu03852/u...ll.exe
windows10-2004-x64
3tbu03852/update.exe
windows7-x64
3tbu03852/update.exe
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 08:09
Static task
static1
Behavioral task
behavioral1
Sample
fe1c426cb92802fc1e6cd9dfd5ae182d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe1c426cb92802fc1e6cd9dfd5ae182d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$SYSDIR/Eminem_Screensaver.scr
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$SYSDIR/Eminem_Screensaver.scr
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$TEMP/dospop.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$TEMP/dospop.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral7
Sample
tbu03852/dospop.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
tbu03852/dospop.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
tbu03852/options.html
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
tbu03852/options.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
tbu03852/static_img.html
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
tbu03852/static_img.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
tbu03852/static_pub.html
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
tbu03852/static_pub.html
Resource
win10v2004-20240910-en
Behavioral task
behavioral15
Sample
tbu03852/tbhelper.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
tbu03852/tbhelper.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
tbu03852/tbs_include_script_008091.js
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
tbu03852/tbs_include_script_008091.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
tbu03852/uninstall.exe
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
tbu03852/uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
tbu03852/update.exe
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
tbu03852/update.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
General
-
Target
fe1c426cb92802fc1e6cd9dfd5ae182d_JaffaCakes118.exe
-
Size
2.9MB
-
MD5
fe1c426cb92802fc1e6cd9dfd5ae182d
-
SHA1
25b0fbb76cb28a9645bd5b370d7d91bf367313b1
-
SHA256
7fc6667437072cad620b7a531ff8cc39ff8c231832f075a4b8db3137dc629cba
-
SHA512
2f4aef9b7e12a5fb4aba1fdcec44074cbc08b2a3e2c736fcdd4b77e32ea0096de3bab139306a55510e4d90ab6013589b1dd2ad56fd2b2ce18c0241ad6d02dcd2
-
SSDEEP
49152:ZYRGywzExp6f6H2BfdyX9iEkT4kxJn/TWZV1U6rz6rGPmB4hGrwdzfF8pPKRW/Bm:q+zSp6f6HAfdC8Ek8kxJ/aZrUyzW4maH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2956 dospop.exe -
Loads dropped DLL 5 IoCs
pid Process 5616 regsvr32.exe 5616 regsvr32.exe 5616 regsvr32.exe 5616 regsvr32.exe 5616 regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{57F9FEF0-6EAE-4030-A68A-30FDC38B1B13}\NoExplorer = "1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{57F9FEF0-6EAE-4030-A68A-30FDC38B1B13} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{57F9FEF0-6EAE-4030-A68A-30FDC38B1B13}\ = "TBSB09293" regsvr32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Eminem_Screensaver.scr fe1c426cb92802fc1e6cd9dfd5ae182d_JaffaCakes118.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files (x86)\DosPop\DospopToolbar\static_pub.html dospop.exe File created C:\Program Files (x86)\DosPop\DospopToolbar\tbs_include_script_008091.js dospop.exe File created C:\Program Files (x86)\DosPop\DospopToolbar\update.exe dospop.exe File created C:\Program Files (x86)\DosPop\DospopToolbar\toolbar-logo-dospop.bmp dospop.exe File created C:\Program Files (x86)\DosPop\DospopToolbar\static_img.html dospop.exe File created C:\Program Files (x86)\DosPop\DospopToolbar\tbhelper.dll dospop.exe File created C:\Program Files (x86)\DosPop\DospopToolbar\basis.xml dospop.exe File created C:\Program Files (x86)\DosPop\DospopToolbar\dospop.crc dospop.exe File created C:\Program Files (x86)\DosPop\DospopToolbar\logo16.bmp dospop.exe File created C:\Program Files (x86)\DosPop\DospopToolbar\options.html dospop.exe File created C:\Program Files (x86)\DosPop\DospopToolbar\uninstall.exe dospop.exe File created C:\Program Files (x86)\DosPop\DospopToolbar\version.txt dospop.exe File created C:\Program Files (x86)\BandsScreensavers - Eminem\Uninstall.exe fe1c426cb92802fc1e6cd9dfd5ae182d_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\DosPop\DospopToolbar\dospop.dll dospop.exe File created C:\Program Files (x86)\DosPop\DospopToolbar\icons.bmp dospop.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe1c426cb92802fc1e6cd9dfd5ae182d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dospop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral2/files/0x00070000000234cf-9.dat nsis_installer_1 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\Desktop\ScreenSaveTimeOut = "900" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\Desktop rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Windows\\system32\\C:\\Windows\\system32\\EMINEM~1.SCR\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\Desktop\ScreenSaveActive = "1" rundll32.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://google-s.alltalkspectrum.net" fe1c426cb92802fc1e6cd9dfd5ae182d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Enable Browser Extensions = "yes" dospop.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Toolbar regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\InternetRegistry\REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\TBSB09293\Toolbar\updateXML = "1" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\InternetRegistry\REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\TBSB09293\Toolbar\TBShow = "1" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://google-s.alltalkspectrum.net" fe1c426cb92802fc1e6cd9dfd5ae182d_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\InternetRegistry\REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\TBSB09293 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\InternetRegistry\REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\TBSB09293\Toolbar\toolbar_id = "{0DEF4CE3-F97C-4c5b-BBAA-E3F5F0812E07}" regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\InternetRegistry\REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\TBSB09293\Toolbar\CurrentLayout = "0" regsvr32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar\{BFB5F154-9212-46F3-B547-AC6106030A54} = 00 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\InternetRegistry regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\InternetRegistry\REGISTRY\USER regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\InternetRegistry\REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\InternetRegistry\REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\TBSB09293\Toolbar regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\InternetRegistry\REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\TBSB09293\Toolbar\toolbar_version = "DosPop Toolbar 1.37" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\InternetRegistry\REGISTRY regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Internet Explorer\Main fe1c426cb92802fc1e6cd9dfd5ae182d_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main fe1c426cb92802fc1e6cd9dfd5ae182d_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Internet Explorer\Main dospop.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar\{BFB5F154-9212-46F3-B547-AC6106030A54} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\iexplore.exe = "0" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Internet Explorer\InternetRegistry\REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\TBSB09293\Toolbar regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\InternetRegistry\REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\InternetRegistry\REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\TBSB09293\Toolbar\firstTime = "1" regsvr32.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://google-s.alltalkspectrum.net" fe1c426cb92802fc1e6cd9dfd5ae182d_JaffaCakes118.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BFB5F154-9212-46F3-B547-AC6106030A54}\TypeLib\ = "{77AA25E8-6083-4949-A831-9CB11861DC10}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{57F9FEF0-6EAE-4030-A68A-30FDC38B1B13}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B75CF7AE-80B0-45C3-BA27-BABC08484319}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{57F9FEF0-6EAE-4030-A68A-30FDC38B1B13}\VersionIndependentProgID\ = "Toolbar3.TBSB09293" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B75CF7AE-80B0-45C3-BA27-BABC08484319}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B75CF7AE-80B0-45C3-BA27-BABC08484319}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TBSB09293.IEToolbar\ = "IE Toolbar" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BFB5F154-9212-46F3-B547-AC6106030A54}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{77AA25E8-6083-4949-A831-9CB11861DC10}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{77AA25E8-6083-4949-A831-9CB11861DC10}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\DosPop\\DospopToolbar\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B75CF7AE-80B0-45C3-BA27-BABC08484319}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\URLSearchHook.ToolbarURLSearchHook.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}\VersionIndependentProgID\ = "URLSearchHook.ToolbarURLSearchHook" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BFB5F154-9212-46F3-B547-AC6106030A54}\ProgID\ = "TBSB09293.IEToolbar.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{57F9FEF0-6EAE-4030-A68A-30FDC38B1B13}\ = "TBSB09293 Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{77AA25E8-6083-4949-A831-9CB11861DC10}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{24BBB29A-FB7B-425B-822D-15D0B861E99B}\ = "IToolbarObj" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B75CF7AE-80B0-45C3-BA27-BABC08484319}\TypeLib\ = "{77AA25E8-6083-4949-A831-9CB11861DC10}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TBSB09293.TBSB09293.3\ = "DosPop Toolbar" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Toolbar3.TBSB09293\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{24BBB29A-FB7B-425B-822D-15D0B861E99B} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B75CF7AE-80B0-45C3-BA27-BABC08484319}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}\ = "IToolbarURLSearchHook" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TBSB09293.TBSB09293\CurVer\ = "TBSB09293.TBSB09293.3" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B75CF7AE-80B0-45C3-BA27-BABC08484319} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BFB5F154-9212-46F3-B547-AC6106030A54}\ = "DosPop Toolbar" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TBSB09293.TBSB09293.3\CLSID\ = "{BFB5F154-9212-46F3-B547-AC6106030A54}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{57F9FEF0-6EAE-4030-A68A-30FDC38B1B13} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\URLSearchHook.ToolbarURLSearchHook\ = "ToolbarURLSearchHook Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{24BBB29A-FB7B-425B-822D-15D0B861E99B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B75CF7AE-80B0-45C3-BA27-BABC08484319}\ = "IPosBHO" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TBSB09293.IEToolbar\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{77AA25E8-6083-4949-A831-9CB11861DC10}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B75CF7AE-80B0-45C3-BA27-BABC08484319}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Toolbar3.TBSB09293\CLSID\ = "{57F9FEF0-6EAE-4030-A68A-30FDC38B1B13}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{77AA25E8-6083-4949-A831-9CB11861DC10}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\URLSearchHook.ToolbarURLSearchHook.1\ = "ToolbarURLSearchHook Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TBSB09293.IEToolbar.1\ = "IE Toolbar" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TBSB09293.IEToolbar.1\CLSID\ = "{BFB5F154-9212-46F3-B547-AC6106030A54}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}\TypeLib\ = "{4509D3CC-B642-4745-B030-645B79522C6D}" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\WOW6432Node\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BFB5F154-9212-46F3-B547-AC6106030A54}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{24BBB29A-FB7B-425B-822D-15D0B861E99B}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{24BBB29A-FB7B-425B-822D-15D0B861E99B}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TBSB09293.IEToolbar.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Toolbar3.TBSB09293.1\CLSID\ = "{57F9FEF0-6EAE-4030-A68A-30FDC38B1B13}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{57F9FEF0-6EAE-4030-A68A-30FDC38B1B13}\TypeLib\ = "{77AA25E8-6083-4949-A831-9CB11861DC10}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{24BBB29A-FB7B-425B-822D-15D0B861E99B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BFB5F154-9212-46F3-B547-AC6106030A54}\ProgID\ = "TBSB09293.TBSB09293.3" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BFB5F154-9212-46F3-B547-AC6106030A54}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{24BBB29A-FB7B-425B-822D-15D0B861E99B}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}\ = "IToolbarURLSearchHook" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BFB5F154-9212-46F3-B547-AC6106030A54}\Programmable regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3040 msedge.exe 3040 msedge.exe 5892 msedge.exe 5892 msedge.exe 4568 identity_helper.exe 4568 identity_helper.exe 5188 msedge.exe 5188 msedge.exe 5188 msedge.exe 5188 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe 5892 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2908 wrote to memory of 3228 2908 fe1c426cb92802fc1e6cd9dfd5ae182d_JaffaCakes118.exe 89 PID 2908 wrote to memory of 3228 2908 fe1c426cb92802fc1e6cd9dfd5ae182d_JaffaCakes118.exe 89 PID 2908 wrote to memory of 3228 2908 fe1c426cb92802fc1e6cd9dfd5ae182d_JaffaCakes118.exe 89 PID 2908 wrote to memory of 2956 2908 fe1c426cb92802fc1e6cd9dfd5ae182d_JaffaCakes118.exe 90 PID 2908 wrote to memory of 2956 2908 fe1c426cb92802fc1e6cd9dfd5ae182d_JaffaCakes118.exe 90 PID 2908 wrote to memory of 2956 2908 fe1c426cb92802fc1e6cd9dfd5ae182d_JaffaCakes118.exe 90 PID 2908 wrote to memory of 4244 2908 fe1c426cb92802fc1e6cd9dfd5ae182d_JaffaCakes118.exe 91 PID 2908 wrote to memory of 4244 2908 fe1c426cb92802fc1e6cd9dfd5ae182d_JaffaCakes118.exe 91 PID 2908 wrote to memory of 4244 2908 fe1c426cb92802fc1e6cd9dfd5ae182d_JaffaCakes118.exe 91 PID 2348 wrote to memory of 5892 2348 explorer.exe 93 PID 2348 wrote to memory of 5892 2348 explorer.exe 93 PID 5892 wrote to memory of 5964 5892 msedge.exe 95 PID 5892 wrote to memory of 5964 5892 msedge.exe 95 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 4756 5892 msedge.exe 96 PID 5892 wrote to memory of 3040 5892 msedge.exe 97 PID 5892 wrote to memory of 3040 5892 msedge.exe 97 PID 5892 wrote to memory of 2200 5892 msedge.exe 98 PID 5892 wrote to memory of 2200 5892 msedge.exe 98 PID 5892 wrote to memory of 2200 5892 msedge.exe 98 PID 5892 wrote to memory of 2200 5892 msedge.exe 98 PID 5892 wrote to memory of 2200 5892 msedge.exe 98 PID 5892 wrote to memory of 2200 5892 msedge.exe 98 PID 5892 wrote to memory of 2200 5892 msedge.exe 98 PID 5892 wrote to memory of 2200 5892 msedge.exe 98 PID 5892 wrote to memory of 2200 5892 msedge.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe1c426cb92802fc1e6cd9dfd5ae182d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe1c426cb92802fc1e6cd9dfd5ae182d_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\explorer.exeexplorer "http://www.bandsscreensavers.com/info.php?title=Eminem scr"2⤵
- System Location Discovery: System Language Discovery
PID:3228
-
-
C:\Users\Admin\AppData\Local\Temp\dospop.exedospop.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2956 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32 /s "C:\Program Files (x86)\DosPop\DospopToolbar\dospop.dll"3⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
PID:5616
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe desk.cpl,InstallScreenSaver "C:\Windows\system32\C:\Windows\system32\EMINEM~1.SCR"2⤵
- System Location Discovery: System Language Discovery
- Modifies Control Panel
PID:4244
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.bandsscreensavers.com/info.php?title=Eminem scr2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5892 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ff813bb46f8,0x7ff813bb4708,0x7ff813bb47183⤵PID:5964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,11897553752196545429,5228879893494810059,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:23⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,11897553752196545429,5228879893494810059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,11897553752196545429,5228879893494810059,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2608 /prefetch:83⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11897553752196545429,5228879893494810059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:13⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11897553752196545429,5228879893494810059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:13⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11897553752196545429,5228879893494810059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:13⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11897553752196545429,5228879893494810059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:13⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,11897553752196545429,5228879893494810059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4072 /prefetch:83⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,11897553752196545429,5228879893494810059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4072 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11897553752196545429,5228879893494810059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:13⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11897553752196545429,5228879893494810059,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:13⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11897553752196545429,5228879893494810059,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3592 /prefetch:13⤵PID:5272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11897553752196545429,5228879893494810059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3980 /prefetch:13⤵PID:5380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11897553752196545429,5228879893494810059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1944 /prefetch:13⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11897553752196545429,5228879893494810059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:13⤵PID:5128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,11897553752196545429,5228879893494810059,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3196 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5188
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5ddd7fcc20dd29eed331b186b5ca2889d
SHA1f7890c5e84f74890bd36dfac8d6f6912e68bf60e
SHA256c0d0a01a21c19475a5be0b5552e992520da735d86e6a40688b26735d4a7490b5
SHA512b3b8ead777be600f59218d988c80b752a30587f1d298900f97beb32966fde18f72158eae3a0da6be6aaf4b5fb3ba4603cf36a99fe79fbd3bab38e8110c8061b2
-
Filesize
223B
MD5ec3733d5ea6c6404204c5bbaae9210e1
SHA16b70c10e79e29904fee05a76b3852ed4e437fb25
SHA256194c4acf404911afcd0f563659ffcc45f33f249e0e41e8681cc15308d0132903
SHA5123d419529e187c6c93d46e7216cdfe6710f77ba575a0fb42b57efedcc6a41261056bfda1ce17bbb85e9619931d420fb1e111748e6d8359d5b9776f1adaea0cb54
-
Filesize
2.1MB
MD50f1846b9162b08ba83b187f8b812882a
SHA13bb577471354017b5c8f6ff1f5159801000110e8
SHA2560c647f88a0f7f7d6ea9796bd7b0401b6359edeb21060c26b911dcfdfc874b37f
SHA512ebacf6356894c8159d6ce0a3a4aac973b09ad6e80751f0edfda004e1df5cc2221f9967d1eff0cb59a3acfbede05e92ddd20b1dc095b2db65ca5c3eb278b9e5c0
-
Filesize
60KB
MD50540c76a162cf8aea5b333a6e183bdbc
SHA110650aed77cafd0e0e10a98a67343157abe93652
SHA2566f00271baba262330950c748e67f41f0d2c98d5e0a5ef7cf099d864d7d9891c0
SHA5127acbe3537f07ef6dc4a2dff809b8cc74edbf7d02ee4a75d0f399725d2dda28c5fa1f407495a23301f322e1655cfef83271be05e8062aab022538fddd6b001ee4
-
Filesize
6KB
MD5ecf6053084c253b4ecb999b77fd5e7fb
SHA1fe7359187bd92e1e9312789a7c9ca1df08947c26
SHA2564d502980795f580774e0904c22cef73aaf81eef9858e67e05d0ef10b74c62105
SHA5127a86d529bf6eca3daaa428fbc7d0dbac20cf30261f2ab1495532cf52087209eb712734fa90d23e063bb3a8e833d90c827fc920cc6785fc19951b5c883fa93f3f
-
Filesize
6KB
MD5adc6e16ce6e97bd1eb19d3a8dad7274f
SHA112b55eab3225b2250ba051803f7d791db59a46a1
SHA25629e525a91d8ac4ec6bb2fa299a404d9f151b45400c7cab09675a23469373435b
SHA5122c4bc233ae8741fe0a6995845aa88d707b347cfc78745fefac346ce27ddd5b799dd374bbba15516f6e61348f52720be3639cf0cd925a599250a9947a33ab7103
-
Filesize
503B
MD52caff3519f5be538757c467d4fec4756
SHA17e77344f049d9ee4d216b6f412c01ba28596773c
SHA256e94503ad0ea2a4f7002ba70f57e12da9daabb5037b6bedc7725d1fc43a487415
SHA512029814dd117053d03acc6c0cb1af2802256149c6a3588cd41334deeffad6095dc16386887e2053f288b13a5ebd3599cbf9c55c194fde81f3df77045d2609a467
-
Filesize
599B
MD50bf3de7de6f6a9ece7674fb245c7e428
SHA1a71d601820676d5741734e825c7347d59570bc98
SHA25629101ddb9fc880b921c78a8aa0952310ccf0fe4eb03479425500fc2e779d4b2b
SHA51230dc0cf67d772a79dec244882f24c4a6ad71a3139b1b92d6e059f1e677ef138596e71c7bf12c2283b591ad64744b9abd15895fa29c4a600f64c784423bc270b2
-
Filesize
316KB
MD58285d06c80bb289d22d7c67c4df2d51c
SHA10aa83342fd5d23de18fb5da4c4405ddc5b13d75f
SHA256d5df73f377bb5113a5e1c4f7872db6ec4753568a1dadf8d5d09798ac9038ad29
SHA5128de26c47bbcf0ea1dcab869ac21eb6d13751a913903a179fbd3ad8f30f0429b15c60af53c68b2661a7adb34a310ba7d91281da34f0ddfe595c409e11c0f34775
-
Filesize
2KB
MD5b734be75b8963660abfa7412095c7a82
SHA16091ffb358b2596d53f4e74e09da01326258dce8
SHA256078d1eadf0733de055e1ca4ff03bdab7203a66823e9cb4d5a8539d84276759a5
SHA5121bd848ab95724bf8b7c6dc2e91a066a85c0d6239c16c3e548cfaa7a6e57c62e432b820b7503e998bc205d9153ec28c7e590610b8f4481e28b2ef6df35f14cf68
-
Filesize
2KB
MD5de7f84d3713c0e55ee2f584345647504
SHA18903bf45c1993fc2df3313e89971b4cba2ba9239
SHA256759282b69a5a1c30a01e0ef7c19a2eb59955e33f0caa0b066e418ef54f5c5884
SHA51296c820d6caf2385faf18aaeaffe743846e158b1e2eabdeb53ec9dafda3fa86ee30f070f7c8e65bd1a0325e6d6fffcfafec175dad07f0dee0f6fcb2660133a193
-
Filesize
48KB
MD5652d9d1fc071f90c3e0adb8d79d7ade2
SHA1b63b34d5b3f2d5b75b0b5ff3290752ae1cf3a68a
SHA2567c30673fde7090d6f74623d9bf99e1b2f9661ec94d21d3c2ffb80e1c56d60891
SHA512410d3c2ce92e5db4c12c46d399e88dac97be784f2b50946e40ba1689a524542e6220864d35d625c3cbb104e20ee351362dbb100423224d319fa62add5c3fa1ae
-
Filesize
76KB
MD5c050609bcf90684099902c043661e739
SHA1e471468f128e3f8899d53f54f0fd64561a297210
SHA2563751b8982c25d16aee9bc7dd5e22c83f323c8c68780012773612778f20279af8
SHA5122e199a074fbef486518949bd57da18b7b221eb1d9d391c30d7ee73817e2d514438d25ed46f2ab68f79f0645013df5fd35100eebc805bea3830aa7b1cfb8d9846
-
Filesize
49B
MD5f1610ba6a619c1703c4dd4ea1c8d71e5
SHA1539d1b8b903d98bd9abaf232b4c2f370ac1e9e81
SHA2560f85f776d85b5ee164a43c166dab525625655bd42b6c0503fa8d36fb702df666
SHA512de5058badc73c1e267e24d7cd18e2c1207337d78185bcd17c4e1ab1131e30f4df5c051cceb748966fd4a8a6b8b2f1d11e2ced29bf5c5ca8404e3f5da5d2d438e
-
Filesize
152B
MD515e9c4b4eefb3e1c08a010e748e10f58
SHA13172378f2c7a00553ce086dbf53fcf3126c5a724
SHA25607b56a769467e8b57f9b7acd9d32da266ca5000803758c18bb6818ac236c7000
SHA512811058b539e914a812c88543bb6657de736f691d18d6dadb5e1f6ced286780fb334dc5f575babbcf4fd2dceda30d1bf4004b374c5775e7f278346b100b29eb7e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\81cdba3a-4cdc-4b39-8cdc-1c1cf72ab308.tmp
Filesize5KB
MD55564134a08dbdee5da35ba096bc240e3
SHA17b7b01f341f30e5cdf3cb02d7d4bf35b10674609
SHA256b8d9b15d73d013d9ff8d8163318b0ced95cef1cc9e088f840b306c81d3bdb85a
SHA51285db0711dac80459556013aeb124a18c802352bdcda53c7c050687ba858ed88e6248819e1d3611f1f7dc3f7fcc24b1f8ebfd8e9c9c64e6108ff8bbb4e1658268
-
Filesize
5KB
MD5eaaa7fd250e564d3a438464ac4585757
SHA130f81e8a2c905a6482005651cfb5509df23c3069
SHA25606e49d25fd43615f46b9c39bb10ca15c765227dddc9b0c55839a93c604d58e73
SHA5120e7fddb3a073caa4c66907534412420f7a777262f8ec2942ff2a4e9bf9964c26001990b9c221a8fb7d8c54aec6ddd9c7c62f8c1f4b51d5c84db7c5f06496241d
-
Filesize
24KB
MD57915ba0545666aa5833cf9f9f86d45d6
SHA1743ecc319bc2a54973582d4a5198042a48fbe8db
SHA256f8fcc045da13bde0f5dec3ada86342105cbff34ebc2442bcf51e8ed509a95b20
SHA512a53036251a22cdc95579ea8641c5574f1dc1f7dfd0390f00ebeafbbea0c1a2c0c3e6dba23bbbb8d8e2c77a3e1e816ccfaf84a97da1c334019c8df1414999d1f9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5967fc884c7f723150924275a333acf40
SHA1f9570254e4564ec395cbdfdf058d080436d8202d
SHA25688ce172ed9ee385bc58c0ec4fd1b707e8289d527e73112f7fbac06fea857efba
SHA51284a6d025429f861a4a8abf49e925e6e096bd42dfe5c12ba905aa530c667df517fe95bf072d39bac1aac129815f6a26180fb8d429afe7f525b7121c901ac357f6
-
Filesize
1KB
MD53c830dd3ba3eddf37b4194e676e56c14
SHA135d978a9b55563d4e5be6b94d8e79f9e31331fb9
SHA256529a7fc41ffc04946cdde745b882f08e2b87a5fa32b13d80fca509bb64d4845b
SHA5120444acc827fe761cd94244c7092c9cebfa29a34e9f763394ec0bfd567c89350c3b4be1bd4d9e91ae052ec928b8f7fc9e1985dcc264836c207c829daa4e6e14a7
-
Filesize
1KB
MD578bbbb18754cfc2943006d7d33058553
SHA174131b1cbc94a3fad68b89c13807f965942ebe45
SHA2567eda5815d7cfa22d29b9fda71b8a6fc4b05a98eab5023c00edba2ac512b5d603
SHA5125667a8dbe29537c695d76b1e5ae3a853f350df4480d33a55f1e526478c8b729b49fad24e25a56b22c73f390b7f0807cc57b2e837a725678c21c6089885f3e2ce
-
Filesize
1KB
MD552278647ef8b430bb2b605de37bd7d55
SHA18fb33bfad47ac5c85e7ec4bf5e498d3b53c8ad28
SHA2564e7abf840a85368f35de29909d571df612ed152fde7e0c00d5d3f4d61aebd909
SHA512a3a2cec415fdb2f517cc8d85d0710b926bb956a22fc178743b6fb87a42de0e79c5e22dd8a3f9cc1cfeaf3e3a1488e0d3e5b04994346ab71d28dc2036c139acf0
-
Filesize
806KB
MD5067a003a0740da60aaa074f45d5266c5
SHA1a5016ff1703d63c215da0f331003759f70f33659
SHA256edb695897f58c9e5533136fa7836216e2463fcaafd1d82dd5e50fa0fd4be471e
SHA512ae692fc8f5a71d4c189e91bf2d0dc0eea7e7636ebfa911dc76f6cbe69f6f7fb5ed2a497e92de39ad77aab166155a01a4b7ff6f493a63f1639b952431a16d007d
-
Filesize
2.2MB
MD5ea6e41e5ffef5e569461419b75c3010b
SHA11a3035985c6be3e9927f8c696554d60ccec748aa
SHA25698b3af807800861fa54157e5d22fc01e6df9e7c50f925da9facf0df2807c7938
SHA512fbfc95da35dea3fdaefeaa6de70afa02cb744760591dee86555960c56ec4af986de3a59e6caf1e1634d64d5146347ccac3f16c28bdf86d79471068d41b501138