Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 10:40
Static task
static1
Behavioral task
behavioral1
Sample
2fa5bd8c33d85d06716b95f183744e61_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2fa5bd8c33d85d06716b95f183744e61_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
/tbu04648/tbhelper.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
/tbu04648/tbhelper.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
/tbu04648/urlfreeze.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
/tbu04648/urlfreeze.dll
Resource
win10v2004-20241007-en
General
-
Target
2fa5bd8c33d85d06716b95f183744e61_JaffaCakes118.exe
-
Size
502KB
-
MD5
2fa5bd8c33d85d06716b95f183744e61
-
SHA1
95eb640bf8b1f885af35c026118f7d44aab0bcb4
-
SHA256
35ae6848c61a63e3087e41f0f26dec377f80d2348385d83318dc87299d253b2d
-
SHA512
38772447484fed579ed0f124a79a3539a1d19ae007584f91b7a86a948e5f9bce21c2f5843e7be6e9d709c1ad8d23bb79a935fad2cbe8dabbfc7be50f5cbcd93f
-
SSDEEP
12288:WGeC05T/BEF4mxBr4brIlScSHomRM2uPy+mkSdST6HTPMRn5:8CaT/BDi+N7ZuP5v6HUn5
Malware Config
Signatures
-
Loads dropped DLL 9 IoCs
pid Process 4084 regsvr32.exe 4084 regsvr32.exe 4084 regsvr32.exe 4084 regsvr32.exe 4084 regsvr32.exe 3752 IEXPLORE.EXE 3752 IEXPLORE.EXE 3752 IEXPLORE.EXE 3752 IEXPLORE.EXE -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{373A8135-92F3-4567-B5F1-4B835B9D9161} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{373A8135-92F3-4567-B5F1-4B835B9D9161}\ = "TBSB05048" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{373A8135-92F3-4567-B5F1-4B835B9D9161}\NoExplorer = "1" regsvr32.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\URLFreeze Toolbar\urlfreeze-header.bmp 2fa5bd8c33d85d06716b95f183744e61_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\URLFreeze Toolbar\urlfreeze.crc 2fa5bd8c33d85d06716b95f183744e61_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\URLFreeze Toolbar\urlfreeze.dll 2fa5bd8c33d85d06716b95f183744e61_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\URLFreeze Toolbar\basis.xml 2fa5bd8c33d85d06716b95f183744e61_JaffaCakes118.exe File created C:\Program Files (x86)\URLFreeze Toolbar\basis.xml 2fa5bd8c33d85d06716b95f183744e61_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\URLFreeze Toolbar\tbhelper.dll 2fa5bd8c33d85d06716b95f183744e61_JaffaCakes118.exe File created C:\Program Files (x86)\URLFreeze Toolbar\tbhelper.dll 2fa5bd8c33d85d06716b95f183744e61_JaffaCakes118.exe File created C:\Program Files (x86)\URLFreeze Toolbar\version.txt 2fa5bd8c33d85d06716b95f183744e61_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\URLFreeze Toolbar\icons.bmp 2fa5bd8c33d85d06716b95f183744e61_JaffaCakes118.exe File created C:\Program Files (x86)\URLFreeze Toolbar\icons.bmp 2fa5bd8c33d85d06716b95f183744e61_JaffaCakes118.exe File created C:\Program Files (x86)\URLFreeze Toolbar\urlfreeze-header.bmp 2fa5bd8c33d85d06716b95f183744e61_JaffaCakes118.exe File created C:\Program Files (x86)\URLFreeze Toolbar\urlfreeze.crc 2fa5bd8c33d85d06716b95f183744e61_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\URLFreeze Toolbar\version.txt 2fa5bd8c33d85d06716b95f183744e61_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2fa5bd8c33d85d06716b95f183744e61_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000000700005e0100000600000009030000c203000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000044656deb13188349ad86e3791bd684780000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0628795a71adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c88e6291f50dd448b150439a5f2f5a3d0000000002000000000010660000000100002000000013a10ef4bc2358ed6b51e206f6868fa1472199b3ba272607d1f42202f5f83003000000000e80000000020000200000004dc5760ce43d39376dcb55873e236401d30205ede54a4c7fcef6cdae551515a2200000008f5fa065673321fe11473908e7c1b509681566f3c97cca55c82ad4dfd8c7894b40000000f45330d5a50aa8758d2b22f537de0cf375b35f79da7f1699f11b67ce1245b733138976a7ef3309d578853e9256362e66e64acf4f3179d1c330601040d696f524 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBar7Layout = 13000000000000000000000020000000100001001600000001000000000700005e0100000600000001030000c203000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000044656deb13188349ad86e3791bd684780000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\urlfreeze.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar\{EB6D6544-1813-4983-AD86-E3791BD68478} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2476499147" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435283440" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\Main 2fa5bd8c33d85d06716b95f183744e61_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{EB6D6544-1813-4983-AD86-E3791BD68478} = 44656deb13188349ad86e3791bd68478 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\MAO Settings iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31136423" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\DiscardLoadTimes = d7a21610d418db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31136423" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\iexplore.exe = "0" regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2478374143" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c88e6291f50dd448b150439a5f2f5a3d00000000020000000000106600000001000020000000817b8ae3dd35ee3994aa3cf248497a9cc25ba1376575db1509d985c8034aa574000000000e8000000002000020000000f662ee9110705eb911f5dd28e6d4e707aad9ffa9e096f4b6ab5a2a3ec7cd94292000000080cd01e4777d12e4d7aa2a9c01eb5fbd1d643b28294f66c28f457c7525cdc0ef400000007a8ae7013625cf23b1def9fdec1ef4c99c6e4a1f88b5fb22cddd4833c1c7fe1829abb902021b5775a8386561d330ec9375021d3cf1ef0e4685fad3c3d0928814 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c05d8095a71adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Toolbar regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBar7Height = "22" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\DOMStorage\urlfreeze.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Enable Browser Extensions = "yes" 2fa5bd8c33d85d06716b95f183744e61_JaffaCakes118.exe Set value (data) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\URLSearchHooks\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{BF345C5D-869A-11EF-BEF1-7E3D785E6C2E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks\{CFBFAE00-17A6-11D0-99CB-00C04FD64497} IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBar7Layout = 13000000000000000000000020000000100001002d00000001000000000700005e0100000600000001030000c203000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000044656deb13188349ad86e3791bd684780000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\urlfreeze.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar\{EB6D6544-1813-4983-AD86-E3791BD68478} = 00 regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2476655360" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31136423" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\URLSearchHook.ToolbarURLSearchHook.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}\InprocServer32\ThreadingModel = "both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EB6D6544-1813-4983-AD86-E3791BD68478}\TypeLib\ = "{2B08F363-DAEC-4FC5-8C61-2E9267A7486B}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Toolbar3.TBSB05048\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9C5C8BAE-63B0-4EC3-BADF-BA4D087E4345}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\URLSearchHook.ToolbarURLSearchHook.1\ = "ToolbarURLSearchHook Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{373A8135-92F3-4567-B5F1-4B835B9D9161}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{373A8135-92F3-4567-B5F1-4B835B9D9161}\ProgID\ = "Toolbar3.TBSB05048.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{88BB509A-B27B-445B-8283-15CFB8F7E905}\TypeLib\ = "{2B08F363-DAEC-4FC5-8C61-2E9267A7486B}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\URLSearchHook.ToolbarURLSearchHook regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Toolbar3.TBSB05048.1\ = "TBSB05048 Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Toolbar3.TBSB05048\ = "TBSB05048 Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9C5C8BAE-63B0-4EC3-BADF-BA4D087E4345}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9C5C8BAE-63B0-4EC3-BADF-BA4D087E4345}\TypeLib\ = "{2B08F363-DAEC-4FC5-8C61-2E9267A7486B}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EB6D6544-1813-4983-AD86-E3791BD68478}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{88BB509A-B27B-445B-8283-15CFB8F7E905}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2B08F363-DAEC-4FC5-8C61-2E9267A7486B}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{88BB509A-B27B-445B-8283-15CFB8F7E905}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9C5C8BAE-63B0-4EC3-BADF-BA4D087E4345}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\URLSearchHook.ToolbarURLSearchHook.1\CLSID\ = "{CA3EB689-8F09-4026-AA10-B9534C691CE0}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{373A8135-92F3-4567-B5F1-4B835B9D9161}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2B08F363-DAEC-4FC5-8C61-2E9267A7486B}\1.0\ = "Toolbar3 1.0 Type Library" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EB6D6544-1813-4983-AD86-E3791BD68478}\VersionIndependentProgID\ = "TBSB05048.TBSB05048" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\WOW6432Node\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9C5C8BAE-63B0-4EC3-BADF-BA4D087E4345}\ = "IPosBHO" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Toolbar3.TBSB05048 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Toolbar3.TBSB05048\CLSID\ = "{373A8135-92F3-4567-B5F1-4B835B9D9161}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{88BB509A-B27B-445B-8283-15CFB8F7E905}\ = "ISoftomateObj" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9C5C8BAE-63B0-4EC3-BADF-BA4D087E4345}\ = "IPosBHO" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\URLSearchHook.ToolbarURLSearchHook\ = "ToolbarURLSearchHook Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}\VersionIndependentProgID\ = "URLSearchHook.ToolbarURLSearchHook" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TBSB05048.TBSB05048\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2B08F363-DAEC-4FC5-8C61-2E9267A7486B} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2B08F363-DAEC-4FC5-8C61-2E9267A7486B}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{88BB509A-B27B-445B-8283-15CFB8F7E905}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\URLSearchHook.ToolbarURLSearchHook.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TBSB05048.IEToolbar.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TBSB05048.IEToolbar.1\CLSID\ = "{EB6D6544-1813-4983-AD86-E3791BD68478}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EB6D6544-1813-4983-AD86-E3791BD68478}\ = "URLFreeze Toolbar" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TBSB05048.TBSB05048\CurVer\ = "TBSB05048.TBSB05048.3" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Toolbar3.TBSB05048.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9C5C8BAE-63B0-4EC3-BADF-BA4D087E4345}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TBSB05048.TBSB05048\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EB6D6544-1813-4983-AD86-E3791BD68478}\ = "IE Toolbar" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2B08F363-DAEC-4FC5-8C61-2E9267A7486B}\1.0\0\win32\ = "C:\\Program Files (x86)\\URLFreeze Toolbar\\urlfreeze.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TBSB05048.TBSB05048\CLSID\ = "{EB6D6544-1813-4983-AD86-E3791BD68478}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TBSB05048.IEToolbar.1\ = "IE Toolbar" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{88BB509A-B27B-445B-8283-15CFB8F7E905}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{88BB509A-B27B-445B-8283-15CFB8F7E905} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9C5C8BAE-63B0-4EC3-BADF-BA4D087E4345}\TypeLib\ = "{2B08F363-DAEC-4FC5-8C61-2E9267A7486B}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{373A8135-92F3-4567-B5F1-4B835B9D9161}\VersionIndependentProgID\ = "Toolbar3.TBSB05048" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TBSB05048.TBSB05048.3\CLSID\ = "{EB6D6544-1813-4983-AD86-E3791BD68478}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2B08F363-DAEC-4FC5-8C61-2E9267A7486B}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TBSB05048.TBSB05048.3\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{373A8135-92F3-4567-B5F1-4B835B9D9161}\ = "TBSB05048 Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{88BB509A-B27B-445B-8283-15CFB8F7E905}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3460 msedge.exe 3460 msedge.exe 4412 msedge.exe 4412 msedge.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 228 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 228 iexplore.exe 228 iexplore.exe 3752 IEXPLORE.EXE 3752 IEXPLORE.EXE 3752 IEXPLORE.EXE 3752 IEXPLORE.EXE 3752 IEXPLORE.EXE 3752 IEXPLORE.EXE 3752 IEXPLORE.EXE 3752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1420 wrote to memory of 4084 1420 2fa5bd8c33d85d06716b95f183744e61_JaffaCakes118.exe 86 PID 1420 wrote to memory of 4084 1420 2fa5bd8c33d85d06716b95f183744e61_JaffaCakes118.exe 86 PID 1420 wrote to memory of 4084 1420 2fa5bd8c33d85d06716b95f183744e61_JaffaCakes118.exe 86 PID 4084 wrote to memory of 228 4084 regsvr32.exe 87 PID 4084 wrote to memory of 228 4084 regsvr32.exe 87 PID 228 wrote to memory of 3752 228 iexplore.exe 88 PID 228 wrote to memory of 3752 228 iexplore.exe 88 PID 228 wrote to memory of 3752 228 iexplore.exe 88 PID 3752 wrote to memory of 1324 3752 IEXPLORE.EXE 89 PID 3752 wrote to memory of 1324 3752 IEXPLORE.EXE 89 PID 1324 wrote to memory of 3460 1324 ie_to_edge_stub.exe 90 PID 1324 wrote to memory of 3460 1324 ie_to_edge_stub.exe 90 PID 3460 wrote to memory of 4656 3460 msedge.exe 91 PID 3460 wrote to memory of 4656 3460 msedge.exe 91 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 1556 3460 msedge.exe 92 PID 3460 wrote to memory of 4412 3460 msedge.exe 93 PID 3460 wrote to memory of 4412 3460 msedge.exe 93 PID 3460 wrote to memory of 1424 3460 msedge.exe 94 PID 3460 wrote to memory of 1424 3460 msedge.exe 94 PID 3460 wrote to memory of 1424 3460 msedge.exe 94 PID 3460 wrote to memory of 1424 3460 msedge.exe 94 PID 3460 wrote to memory of 1424 3460 msedge.exe 94 PID 3460 wrote to memory of 1424 3460 msedge.exe 94 PID 3460 wrote to memory of 1424 3460 msedge.exe 94 PID 3460 wrote to memory of 1424 3460 msedge.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fa5bd8c33d85d06716b95f183744e61_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2fa5bd8c33d85d06716b95f183744e61_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32 /s "C:\Program Files (x86)\URLFreeze Toolbar\urlfreeze.dll"2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.urlfreeze.com/3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:228 CREDAT:17410 /prefetch:24⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\ie_to_edge_stub.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\ie_to_edge_stub.exe" --from-ie-to-edge=3 --ie-frame-hwnd=502aa5⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --from-ie-to-edge=3 --ie-frame-hwnd=502aa6⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc3d5a46f8,0x7ffc3d5a4708,0x7ffc3d5a47187⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,14481007141803014153,15386227923560355414,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:27⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,14481007141803014153,15386227923560355414,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:37⤵
- Suspicious behavior: EnumeratesProcesses
PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,14481007141803014153,15386227923560355414,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:87⤵PID:1424
-
-
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2932
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5673aa08cae3fcfcbcb1e7614d9abab27
SHA1a4f1e012aba0a2036792f2d9cfcb45195f5cec45
SHA2560cd43636d74174b5799103f99bdc95ac802f465b247f69086769dcd0a18636bb
SHA51208c5e69c06a0e5d44e5837dd91fb99e67c19e23e22bbd4c994f58b746a4a8c6635951a8a13a7aaca89b20ee8722f245bcfc993f56be0456c63fe83853a0d559f
-
Filesize
181KB
MD5cb2fffaaa404ecb4877117d5543f3171
SHA15b7568d03a7578514f0ef25072ed5c79b1f91125
SHA2560d98a239e2323cfaf039c6a7c88fceb7d491f48bb71cba4f5fa99e816e2168ef
SHA51252092e972c748b0462fcc33643fa63344688a44246934c7f728dc5339deab50e79026c7ab11008c88b80e24b4ddd6b36d52f1c8265f41d946c961c9ec0ea045f
-
Filesize
372KB
MD587503cf652a007ccbff38d5b370e94ec
SHA1141f20a4fd5bd549eb7dcfe0fca0918ca65d4bf5
SHA256cc1ae922b46a94e3af01d79ce9e38b0f97482351150fab7e384b62d0d646479a
SHA5129c806981911697e32840cd9ed42eb65accf024d74f304cad8b1951b1214145597cfd98f75038abdb4db53fdd726256cc697ae576cec0247b29811df943e36bc3
-
Filesize
5KB
MD593dbf5984d93488ad789c070d5d93b6c
SHA16ebb883f90a3898952b57cb3b7c703fffc3171ac
SHA256241b817d20a3dd5762a4093a703d29986e0110d338d41885be577cc343ade9a1
SHA512d5f8a92331bebed6fb8b0e225ce14cbbee5e8e46690854437c93efe2e4b94ac9c7613c8f66fb4fb1ba7c7816f68e9b3551ab3b45bfe2e181d6a78150bd83beef
-
Filesize
120B
MD54a6367845967f7f8df3a9a029fa5acff
SHA12d37f53bdc44e0a1dd1928b17f6dabeda1c47aca
SHA2560c29637bc4484c8aff41bb44ffda321ad9120163026aff523431cf4a8c922891
SHA512120957ebbf54cc11cd77daef32a9dcbbfc4de5a850553414dded7937a621c65ab7bf922b72d601f676ecaff192539bb5ce8f440c548d5e898a53735ac32ec89b
-
Filesize
1.2MB
MD518119d058f699d165ddf4b8e79e35494
SHA1b40b9d7743e99ad78570c40a55133e24efc6aee2
SHA256d9ef9c53ca7466bf5007601ea002dbcd2d095e34474da64e6b4c4079d3dc93eb
SHA512497c3f5ed6790ad47e9564d9a943a07ab0d54d016487b8a4b1cd4c405f66b73fa2936c7c5defb9a04b89f636b658793f2abb91c8e299917ce52daabfdd0841bd
-
Filesize
51B
MD5c2a9d10df6c5a7e0c79f77382c36b7ad
SHA1519c7e90c2a526686bb3dfffabb0d0da747f37ae
SHA256dd41bf9a5e5ada5ba4db6cd4f9877a1dc1a7a6b909677a2bcce65b76b6cadd46
SHA5128df975b04b36b42fbb4d155e9354aad0473c7d2953521b443a08825ccb102d31a39516b50902aa41d9030f8b5ecc098bec4716b245241c05e68205c4f9e6a454
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
6KB
MD5e93cfedf66620d5f8351b44c15365ab2
SHA1977d4e9531a15b5dee6f097389914b34272234e9
SHA256de0e5cf05d633c64a93717c2db82359b42e11af3d6af007caf73b8c4a08b6c36
SHA5124211c9011107ad382c47486d736ada17ff73d445a2f86fac8e4ac24925a62481f8a61d79f7897d0e5efc3bd84c718437d02f915f7e7d278ed345d48a041b3afc
-
Filesize
6KB
MD5469d2b44c614cee395201d49370b2450
SHA146e5eef6920fe6a060d1afcdfe0610ccd64b8027
SHA256b45b6948995afb632f1297760a1de6cdd664cedfe565bef837cc6525299368b8
SHA51220cf02af57e5fbec3008a59cd15651ad8d5bae42b9bb114f952c13d97023b121446a8c3cab0426fd44dd285511f757cb3acff10d9d8bbcb9188f0eb951b41ed1
-
Filesize
6KB
MD5d40e72508fa76a98c29e1b26b8b936b5
SHA15058718be32a33dada223091d066a35f02a9ac30
SHA2567ac8014ae961767abe3764d09f1795dd1f31917f8e58f62938e0c035eb62a100
SHA5128d6e2e5bc37dadb5f0caa4bbf7453bca354d26e0fa9bd619dec3358eb01947222d8ce008050a7e5e1859952a3ff4253b4c3908f651deedade22d97b51df820bd
-
Filesize
10KB
MD5e96eaf9783eaecefc412379861e9d19f
SHA1fb271fae406ee1fdcd508b246499f91fc2b90578
SHA256536b91f4585969af529381d927c586b4f151a1a1e526a9dd2422aff347623eec
SHA512a4a521954979e0b4564688408f74c3230279076f2dc550e09c0d232d2859ba354651af2b643d39d9769562fdd519601a47952c1a048b8f9398af2179073bfd5f
-
Filesize
799B
MD5df0e1c969ae0242bfe209b7ae5d47e72
SHA1ea672bddef3c9bbbdd64eed1d81c15ecf574c0b1
SHA256afaf0d6bd410f74962a46fe0f56f8a46ae1cf5ddfd418ea89d5d990b052e97eb
SHA5127b08de67ad33f2d2afb698554ca72d87adf8bb4422014f6ceecd7609ff89ff75c2b8b71032822b60cbcdffc501a201c85d88a7f299c9f8933b6dcf8957f90972
-
Filesize
603B
MD5950ccfc43a1693d3b6892e9365d3c079
SHA1c42f4244418ae2f2305a977f907278bc1b3de706
SHA256090735829c25937deb7cc8cd712bea6050d44a34270c97213fae7d5fe8b0b7d4
SHA51273534e3809673f41dade7213b93559353d213bc70b698b2e9c674f5026301514a2b07315a5ba4027938226d0f3c284da310f050f2172e45014dafa0c5fcadd3a
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
742KB
MD525a40f949855471562a1a9e465cfed7c
SHA1c3a563c56fb8323e6c2ee7fa417c45d8384a4156
SHA256075f1f4ec57dcfdbb2f1b60ffbf9efe0286216c43d0a65f82eae86af66b36127
SHA512e5b4ed8df62488e7bb9ccb77f1daac251f65cd3251257ab94094df1316fa50a96901b32e7e76e47a4616d763ae54d7134f5d29f030ee7d2399bbe728498fedd4