Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 02:29
Static task
static1
Behavioral task
behavioral1
Sample
3805ed8a271ce1e3eb9c80ce61945ede_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3805ed8a271ce1e3eb9c80ce61945ede_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3805ed8a271ce1e3eb9c80ce61945ede_JaffaCakes118.exe
-
Size
3.9MB
-
MD5
3805ed8a271ce1e3eb9c80ce61945ede
-
SHA1
80e33752670474d84478a62d0dd50e8f5d051ffc
-
SHA256
32f5183395c20856fa10399da6d5dde99135507b4125a7b2c0b957e9de37d8c1
-
SHA512
20a9e9f49369c97e195948b214955971e8f42356892f465e0edd72aaa778af6e9ba93a1ef53516321cba64fb0d7536d2d646a0abbe944e12106ebf585cfcabe3
-
SSDEEP
98304:waE9LOk6Nx4J8PG2cNS2fnzvWUvJYvtlyGviSJNIvB6j:ueH4J8Pi4onLWHLygHHj
Malware Config
Signatures
-
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 8 IoCs
pid Process 2860 00000ad4T8SETUP.EXE 1500 AppIntegrator64.exe 912 65srchmn.exe 2196 65barsvc.exe 2952 65barsvc.exe 2960 65brmon.exe 1784 65barsvc.exe 2360 65HighIn.exe -
Loads dropped DLL 64 IoCs
pid Process 2772 3805ed8a271ce1e3eb9c80ce61945ede_JaffaCakes118.exe 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 1500 AppIntegrator64.exe 912 65srchmn.exe 912 65srchmn.exe 1500 AppIntegrator64.exe 1500 AppIntegrator64.exe 1500 AppIntegrator64.exe 912 65srchmn.exe 2860 00000ad4T8SETUP.EXE 2196 65barsvc.exe 2196 65barsvc.exe 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2952 65barsvc.exe 2952 65barsvc.exe 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2960 65brmon.exe 2960 65brmon.exe 2960 65brmon.exe 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2360 65HighIn.exe 2360 65HighIn.exe 2360 65HighIn.exe 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FromDocToPDF Home Page Guard 64 bit = "\"C:\\PROGRA~2\\FROMDO~1\\bar\\1.bin\\AppIntegrator64.exe\"" 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FromDocToPDF Search Scope Monitor = "\"C:\\PROGRA~2\\FROMDO~1\\bar\\1.bin\\65srchmn.exe\" /m=2 /w /h" 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FromDocToPDF_65 Browser Plugin Loader = "C:\\PROGRA~2\\FROMDO~1\\bar\\1.bin\\65brmon.exe" 00000ad4T8SETUP.EXE -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 6 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{f236ca79-3123-4afb-9f74-e98117ad5625} 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{f236ca79-3123-4afb-9f74-e98117ad5625} 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{f236ca79-3123-4afb-9f74-e98117ad5625}\ 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{a235e1e3-6296-4710-af39-104a7faa6c7c} 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{a235e1e3-6296-4710-af39-104a7faa6c7c}\ 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{f236ca79-3123-4afb-9f74-e98117ad5625} 00000ad4T8SETUP.EXE -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65mlbtn.dll 00000ad4T8SETUP.EXE File opened for modification C:\Program Files\Internet Explorer\msimg32.dll 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\CREXT.DLL 00000ad4T8SETUP.EXE File opened for modification C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65dlghk.dll 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65tpinst.dll 00000ad4T8SETUP.EXE File opened for modification C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65brstub.dll 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65datact.dll 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\T8RES.DLL 00000ad4T8SETUP.EXE File opened for modification C:\Program Files\Internet Explorer\ieuser.exe 00000ad4T8SETUP.EXE File opened for modification C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\BOOTSTRAP.JS 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65hkstub.dll 00000ad4T8SETUP.EXE File opened for modification C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65idle.dll 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65reghk.dll 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65SrcAs.dll 00000ad4T8SETUP.EXE File opened for modification C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65SrchMn.exe 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\VERIFY.DLL 00000ad4T8SETUP.EXE File opened for modification C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\installKeys.js 00000ad4T8SETUP.EXE File opened for modification C:\Program Files (x86)\FromDocToPDF_65\bar\gen1\COMMON.T8S 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\BOOTSTRAP.JS 00000ad4T8SETUP.EXE File opened for modification C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\Hpg64.dll 00000ad4T8SETUP.EXE File opened for modification C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\LOGO.BMP 00000ad4T8SETUP.EXE File opened for modification C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\CREXT.DLL 00000ad4T8SETUP.EXE File opened for modification C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65skin.dll 00000ad4T8SETUP.EXE File opened for modification C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\VERIFY.DLL 00000ad4T8SETUP.EXE File opened for modification C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65reghk.dll 00000ad4T8SETUP.EXE File opened for modification C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\T8EXTEX.DLL 00000ad4T8SETUP.EXE File opened for modification C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65radio.dll 00000ad4T8SETUP.EXE File opened for modification C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65barsvc.exe 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65ieovr.dll 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\IE9Mesg\COMMON.T8S 00000ad4T8SETUP.EXE File opened for modification C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65bprtct.dll 00000ad4T8SETUP.EXE File opened for modification C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\T8EXTPEX.DLL 00000ad4T8SETUP.EXE File opened for modification C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65SrcAs.dll 00000ad4T8SETUP.EXE File opened for modification C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\AppIntegrator64.exe 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65dyn.dll 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65medint.exe 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65mlbtn.dll 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65Plugin.dll 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\AppIntegratorStub64.dll 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\NP65Stub.dll 00000ad4T8SETUP.EXE File opened for modification C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65dyn.dll 00000ad4T8SETUP.EXE File opened for modification C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65highin.exe 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65htmlmu.dll 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65sknlcr.dll 00000ad4T8SETUP.EXE File opened for modification C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\NP65Stub.dll 00000ad4T8SETUP.EXE File opened for modification C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\EXEMANAGER.DLL 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65brmon.exe 00000ad4T8SETUP.EXE File opened for modification C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65regfft.dll 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\gen1\COMMON.T8S 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\CrExtP65.exe 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65impipe.exe 00000ad4T8SETUP.EXE File opened for modification C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65Plugin.dll 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65regfft.dll 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65regiet.dll 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65bar.dll 00000ad4T8SETUP.EXE File opened for modification C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65regiet.dll 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\INSTALL.RDF 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\LOGO.BMP 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\T8EXTPEX.DLL 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65idle.dll 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\DPNMNGR.DLL 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65skplay.exe 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65httpct.dll 00000ad4T8SETUP.EXE File created C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\T8EXTEX.DLL 00000ad4T8SETUP.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65srchmn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65barsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65barsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65brmon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65barsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65HighIn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3805ed8a271ce1e3eb9c80ce61945ede_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00000ad4T8SETUP.EXE -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{36b445bf-1b84-466a-a623-a360a8cff8c3} 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{e0c3a839-0e5e-4ebc-9f8f-e56f8fc732ce} 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\URLSearchHooks\{CFBFAE00-17A6-11D0-99CB-00C04FD64497} 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{a3b975a0-f679-444e-9d94-6d292fa53140} 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{a3b975a0-f679-444e-9d94-6d292fa53140}\AppPath = "C:\\Program Files (x86)\\FromDocToPDF_65\\bar\\1.bin" 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{6cbf5c01-c876-481b-867e-111cb1d2a7d6} 00000ad4T8SETUP.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{6cbf5c01-c876-481b-867e-111cb1d2a7d6}\Policy = "3" 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\URLSearchHooks\{4c60e5ab-5c68-4c59-abaa-885010b24b32} 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{d97143c2-4282-496b-bdc4-7ec852f1497c}\AppPath = "C:\\Program Files (x86)\\FromDocToPDF_65\\bar\\1.bin" 00000ad4T8SETUP.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{a3b975a0-f679-444e-9d94-6d292fa53140}\Policy = "3" 00000ad4T8SETUP.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{701f5c41-bb30-46da-a56b-68784b0b762b}\Policy = "3" 00000ad4T8SETUP.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{d97143c2-4282-496b-bdc4-7ec852f1497c}\Policy = "3" 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{6cbf5c01-c876-481b-867e-111cb1d2a7d6}\AppPath = "C:\\Program Files (x86)\\FromDocToPDF_65\\bar\\1.bin" 00000ad4T8SETUP.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{36b445bf-1b84-466a-a623-a360a8cff8c3}\Policy = "3" 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{a3b975a0-f679-444e-9d94-6d292fa53140}\AppName = "65medint.exe" 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{701f5c41-bb30-46da-a56b-68784b0b762b} 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{e0c3a839-0e5e-4ebc-9f8f-e56f8fc732ce}\AppPath = "C:\\Program Files (x86)\\FromDocToPDF_65\\bar\\1.bin" 00000ad4T8SETUP.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{e0c3a839-0e5e-4ebc-9f8f-e56f8fc732ce}\Policy = "3" 00000ad4T8SETUP.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION\CrExtP65.exe = "0" 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{d97143c2-4282-496b-bdc4-7ec852f1497c}\AppName = "65impipe.exe" 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Toolbar 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{36b445bf-1b84-466a-a623-a360a8cff8c3}\AppName = "AppIntegrator64.exe" 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{e0c3a839-0e5e-4ebc-9f8f-e56f8fc732ce}\AppName = "65SkPlay.exe" 00000ad4T8SETUP.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\UrlSearchHooks 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{d97143c2-4282-496b-bdc4-7ec852f1497c} 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Toolbar\{c66a678d-5e6c-4af9-8f57-c6192f42cf74} 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{36b445bf-1b84-466a-a623-a360a8cff8c3}\AppPath = "C:\\Program Files (x86)\\FromDocToPDF_65\\bar\\1.bin" 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{701f5c41-bb30-46da-a56b-68784b0b762b}\AppName = "65SrchMn.exe" 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{701f5c41-bb30-46da-a56b-68784b0b762b}\AppPath = "C:\\Program Files (x86)\\FromDocToPDF_65\\bar\\1.bin" 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{6cbf5c01-c876-481b-867e-111cb1d2a7d6}\AppName = "65SlSrch.exe" 00000ad4T8SETUP.EXE -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run 00000ad4T8SETUP.EXE Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Run 00000ad4T8SETUP.EXE Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Run 00000ad4T8SETUP.EXE -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FromDocToPDF_65.SettingsPlugin\ 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E8285E4C-5C92-4AA5-B227-3147E9454EC8}\TypeLib\ = "{542EAC56-BF4B-46A7-943E-0A4C2CBA34EA}" 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{13119113-0854-469d-807A-171568457991}\VersionIndependentProgID 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33119133-0854-469d-807A-171568457991}\ 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{463A3C2B-3B87-4FAD-A9A6-CD1B93ED836C}\TypeLib\ = "{74C02D12-FAEE-4834-80D2-5B7D2480AD61}" 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2C9D27D8-C81E-4968-8026-E725E01650C1}\1.0\ = "DialogHook 1.0 Type Library" 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6191571E-F7EE-47C3-B229-2DFAC70DB5D2}\1.0\ = "TEMPLATEBARFEEDTYPELib" 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FromDocToPDF_65.PseudoTransparentPlugin\ = "Pseudo Transparent Plugin" 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{36B445BF-1B84-466A-A623-A360A8CFF8C3}\TypeLib\ = "{74C02D12-FAEE-4834-80D2-5B7D2480AD61}" 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e1c4699e-5e74-4f30-a4a2-378e45d44f07}\MiscStatus\ = "0" 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1EF6208B-483A-48F6-B9E5-9B6C54200F8C}\TypeLib 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e0c3a839-0e5e-4ebc-9f8f-e56f8fc732ce}\MiscStatus\1 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ae84501a-2cb6-41d6-b3a7-9679bdbdfa0b}\TypeLib\ = "{4d8aeb1d-4ed4-44ac-a039-4775b2575db0}" 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D97143C2-4282-496B-BDC4-7EC852F1497C}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{cbbea4b9-b183-47ac-8b1f-fd526ac99a8d}\MiscStatus\ = "0" 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{316A2A46-F832-49B3-95E0-D460BD88D6B4}\ = "PSEUDOTRANSPARENT_INTERFACE" 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C7879E06-4C3F-4061-B619-7CFD072E4F26}\TypeLib 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E70DAE92-1A31-4AB8-9FCF-52FBDA0CC66A}\TypeLib\Version = "1.0" 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{504b4aa9-9952-4490-b0e1-80a5321c35f7}\MiscStatus\ = "0" 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f96ee2ef-fe15-4878-aecd-bc367f12c70f}\Programmable 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FromDocToPDF_65.XMLSessionPlugin.1\ 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8ad40e5e-9fd9-4f5e-b4d1-ddf2c921dce3}\Control 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{542EAC56-BF4B-46A7-943E-0A4C2CBA34EA}\1.0\0\win32 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{62D88F68-AC05-4FBF-AC16-E76B3B7B6531}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777CEBBF-A763-42BE-ABBF-FF264689666B}\TypeLib 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FromDocToPDF_65.HTMLMenu\CurVer 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C7879E06-4C3F-4061-B619-7CFD072E4F26}\ = "ITemplateBarButtonRect" 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6CBF5C01-C876-481B-867E-111CB1D2A7D6}\TypeLib 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2C9D27D8-C81E-4968-8026-E725E01650C1}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\FromDocToPDF_65\\bar\\1.bin" 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A1F3E70D-04BA-47FB-ACCA-CC8FCFA74D41} 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1EF6208B-483A-48F6-B9E5-9B6C54200F8C}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6467B28C-D408-4066-8B26-056335875D3D}\ProxyStubClsid32 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{463A3C2B-3B87-4FAD-A9A6-CD1B93ED836C}\TypeLib 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FromDocToPDF_65.ToolbarProtector 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FC65C7F9-115F-42A6-BC49-BF7A60A5314E} 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FromDocToPDF_65.MultipleButton\CurVer\ = "FromDocToPDF_65.MultipleButton.1" 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A1F3E70D-04BA-47FB-ACCA-CC8FCFA74D41}\TypeLib\ = "{2C9D27D8-C81E-4968-8026-E725E01650C1}" 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f96ee2ef-fe15-4878-aecd-bc367f12c70f}\ProgID 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FromDocToPDF_65.Radio.1\CLSID\ = "{b7fd68f7-d28b-431e-9ee8-e45d915b7f17}" 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{13119113-0854-469d-807A-171568457991}\ProgID\ = "FromDocToPDF_65.SkinLauncher.1" 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2bd4465d-669a-42e6-b449-636b0b10ebb8}\TypeLib\ = "{a85aca7e-5cd2-461b-877a-994ccccf491c}" 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E70DAE92-1A31-4AB8-9FCF-52FBDA0CC66A}\TypeLib 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{504b4aa9-9952-4490-b0e1-80a5321c35f7}\MiscStatus\1 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3BB1BA04-1B88-4690-9AD3-0D38412F5FF1}\1.0\0\win32\ = "C:\\Program Files (x86)\\FromDocToPDF_65\\bar\\1.bin\\t8res.dll\\1003" 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F4F94932-9CDB-45F4-BD4A-C77B5074D353}\TypeLib\ = "{1747AE4D-0A83-4336-84D4-48500BF1554F}" 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A9141680-DC75-4DD7-B86D-9CC2A83DCB9B}\TypeLib 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8ad40e5e-9fd9-4f5e-b4d1-ddf2c921dce3} 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{314D051A-F3B4-4B7A-AAB4-1122FB82A0B5}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A85ACA7E-5CD2-461B-877A-994CCCCF491C}\1.0\0\win32 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{03119103-0854-469D-807A-171568457991}\1.0\0\win32\ = "C:\\Program Files (x86)\\FromDocToPDF_65\\bar\\1.bin\\t8res.dll\\1706" 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E70DAE92-1A31-4AB8-9FCF-52FBDA0CC66A} 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E3CDDB72-3ADC-4920-B42B-68A8C29FA942}\1.0\0\win32 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4ffa72ec-9fd9-4b2b-92a5-68b60885fd8a}\TypeLib 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{316A2A46-F832-49B3-95E0-D460BD88D6B4}\ = "PSEUDOTRANSPARENT_INTERFACE" 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A9141680-DC75-4DD7-B86D-9CC2A83DCB9B}\ = "IHttpControl" 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{bc7e25d7-4681-46a3-af5a-9a1b865783ed}\MiscStatus\1 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{36B445BF-1B84-466A-A623-A360A8CFF8C3}\ProxyStubClsid32 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CF9608AD-4ECF-4A16-B122-B374299DE7B5}\ = "IDataCtrl" 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{cd1d181e-c654-4ca5-9d09-b3648537fd7d}\Version\ = "1.0" 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4D8AEB1D-4ED4-44AC-A039-4775B2575DB0}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\FromDocToPDF_65\\bar\\1.bin" 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{cd1d181e-c654-4ca5-9d09-b3648537fd7d}\Programmable 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FromDocToPDF_65.HTMLPanel.1\CLSID 00000ad4T8SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FromDocToPDF_65.SkinLauncherSettings.1\CLSID 00000ad4T8SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C7879E06-4C3F-4061-B619-7CFD072E4F26}\ = "ITemplateBarButtonRect" 00000ad4T8SETUP.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE 2860 00000ad4T8SETUP.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2860 00000ad4T8SETUP.EXE Token: SeBackupPrivilege 2860 00000ad4T8SETUP.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1500 AppIntegrator64.exe 912 65srchmn.exe 2960 65brmon.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2860 2772 3805ed8a271ce1e3eb9c80ce61945ede_JaffaCakes118.exe 30 PID 2772 wrote to memory of 2860 2772 3805ed8a271ce1e3eb9c80ce61945ede_JaffaCakes118.exe 30 PID 2772 wrote to memory of 2860 2772 3805ed8a271ce1e3eb9c80ce61945ede_JaffaCakes118.exe 30 PID 2772 wrote to memory of 2860 2772 3805ed8a271ce1e3eb9c80ce61945ede_JaffaCakes118.exe 30 PID 2772 wrote to memory of 2860 2772 3805ed8a271ce1e3eb9c80ce61945ede_JaffaCakes118.exe 30 PID 2772 wrote to memory of 2860 2772 3805ed8a271ce1e3eb9c80ce61945ede_JaffaCakes118.exe 30 PID 2772 wrote to memory of 2860 2772 3805ed8a271ce1e3eb9c80ce61945ede_JaffaCakes118.exe 30 PID 2860 wrote to memory of 1500 2860 00000ad4T8SETUP.EXE 31 PID 2860 wrote to memory of 1500 2860 00000ad4T8SETUP.EXE 31 PID 2860 wrote to memory of 1500 2860 00000ad4T8SETUP.EXE 31 PID 2860 wrote to memory of 1500 2860 00000ad4T8SETUP.EXE 31 PID 2860 wrote to memory of 912 2860 00000ad4T8SETUP.EXE 32 PID 2860 wrote to memory of 912 2860 00000ad4T8SETUP.EXE 32 PID 2860 wrote to memory of 912 2860 00000ad4T8SETUP.EXE 32 PID 2860 wrote to memory of 912 2860 00000ad4T8SETUP.EXE 32 PID 2860 wrote to memory of 912 2860 00000ad4T8SETUP.EXE 32 PID 2860 wrote to memory of 912 2860 00000ad4T8SETUP.EXE 32 PID 2860 wrote to memory of 912 2860 00000ad4T8SETUP.EXE 32 PID 2860 wrote to memory of 2196 2860 00000ad4T8SETUP.EXE 33 PID 2860 wrote to memory of 2196 2860 00000ad4T8SETUP.EXE 33 PID 2860 wrote to memory of 2196 2860 00000ad4T8SETUP.EXE 33 PID 2860 wrote to memory of 2196 2860 00000ad4T8SETUP.EXE 33 PID 2860 wrote to memory of 2196 2860 00000ad4T8SETUP.EXE 33 PID 2860 wrote to memory of 2196 2860 00000ad4T8SETUP.EXE 33 PID 2860 wrote to memory of 2196 2860 00000ad4T8SETUP.EXE 33 PID 2860 wrote to memory of 2952 2860 00000ad4T8SETUP.EXE 34 PID 2860 wrote to memory of 2952 2860 00000ad4T8SETUP.EXE 34 PID 2860 wrote to memory of 2952 2860 00000ad4T8SETUP.EXE 34 PID 2860 wrote to memory of 2952 2860 00000ad4T8SETUP.EXE 34 PID 2860 wrote to memory of 2952 2860 00000ad4T8SETUP.EXE 34 PID 2860 wrote to memory of 2952 2860 00000ad4T8SETUP.EXE 34 PID 2860 wrote to memory of 2952 2860 00000ad4T8SETUP.EXE 34 PID 2860 wrote to memory of 2960 2860 00000ad4T8SETUP.EXE 35 PID 2860 wrote to memory of 2960 2860 00000ad4T8SETUP.EXE 35 PID 2860 wrote to memory of 2960 2860 00000ad4T8SETUP.EXE 35 PID 2860 wrote to memory of 2960 2860 00000ad4T8SETUP.EXE 35 PID 2860 wrote to memory of 2960 2860 00000ad4T8SETUP.EXE 35 PID 2860 wrote to memory of 2960 2860 00000ad4T8SETUP.EXE 35 PID 2860 wrote to memory of 2960 2860 00000ad4T8SETUP.EXE 35 PID 2860 wrote to memory of 2360 2860 00000ad4T8SETUP.EXE 37 PID 2860 wrote to memory of 2360 2860 00000ad4T8SETUP.EXE 37 PID 2860 wrote to memory of 2360 2860 00000ad4T8SETUP.EXE 37 PID 2860 wrote to memory of 2360 2860 00000ad4T8SETUP.EXE 37 PID 2860 wrote to memory of 2360 2860 00000ad4T8SETUP.EXE 37 PID 2860 wrote to memory of 2360 2860 00000ad4T8SETUP.EXE 37 PID 2860 wrote to memory of 2360 2860 00000ad4T8SETUP.EXE 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\3805ed8a271ce1e3eb9c80ce61945ede_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3805ed8a271ce1e3eb9c80ce61945ede_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\00000ad4T8SETUP.EXE"C:\Users\Admin\AppData\Local\Temp\00000ad4T8SETUP.EXE" /p=^Y6/n="FromDocToPDF"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\PROGRA~2\FROMDO~1\bar\1.bin\AppIntegrator64.exe"C:\PROGRA~2\FROMDO~1\bar\1.bin\AppIntegrator64.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1500
-
-
C:\PROGRA~2\FROMDO~1\bar\1.bin\65srchmn.exe"C:\PROGRA~2\FROMDO~1\bar\1.bin\65srchmn.exe" /m=2 /w /h /r3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:912
-
-
C:\PROGRA~2\FROMDO~1\bar\1.bin\65barsvc.exe"C:\PROGRA~2\FROMDO~1\bar\1.bin\65barsvc.exe" -remove3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2196
-
-
C:\PROGRA~2\FROMDO~1\bar\1.bin\65barsvc.exe"C:\PROGRA~2\FROMDO~1\bar\1.bin\65barsvc.exe" -install3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2952
-
-
C:\PROGRA~2\FROMDO~1\bar\1.bin\65brmon.exe"C:\PROGRA~2\FROMDO~1\bar\1.bin\65brmon.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2960
-
-
C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65HighIn.exe"C:\Program Files (x86)\FromDocToPDF_65\bar\1.bin\65HighIn.exe" 65tpinst.dll,#53⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2360
-
-
-
C:\PROGRA~2\FROMDO~1\bar\1.bin\65barsvc.exeC:\PROGRA~2\FROMDO~1\bar\1.bin\65barsvc.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1784
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD598e56fd43f64538baa9b1f367951091f
SHA19d54baf23397e5f1444bc6471052ad234b76fbd3
SHA256efbae6177e046b2a1b165cc0aeb1cb4812df29de4da48a8286abb9d02460384d
SHA512baf47142fcca94069e2ec71eb00457b4187cad831e215e56539d23d01acc842b8bac090fa8d4827c55e4ad16019fd3310f2506515a3cc47cee0b7609585d23c1
-
Filesize
432KB
MD56837c7bb84d6c3200117e05b4fe1d147
SHA13d7cd376dfdb97512a376e85fbb7f04344c051b6
SHA256b9e6945ca093d66a37d44c16f0470e301852e62ceaf522b5672254b00f4c4699
SHA512e1e08a3c6052a847af2e45dda747d795fd4ffeb491a2322b8400fbe81c3d6933f058493b4548e6e2ef03fb976a470adc46414b432bbaab928dc3154e4eaddd9d
-
Filesize
190KB
MD5220c94891891769c6ec0d5d2d9eeac4a
SHA1cb59f40104a6705bdee3b0ff647221d7041fb2de
SHA2567985692f6e2f9cfd3255541747960d1643d892d7a259f0b3203b50811bdd381f
SHA51229eb351ac34845f888a3a05fd7990d02a49953b2c74c864ea985c96621af8fc8a96d2cfa7fe657386e4e95ed5046a180ffc5e46c8a81fc80ceabc4bc8cdaa143
-
Filesize
536KB
MD5761b9482dd1ae4f8c8f5c2a40552687b
SHA1eedd231e732381e335d371124f999206d135e7db
SHA256c76ccfa91a33468e7aeacdea5dd23d8552077f49c8d192eeb05f56f33ce91bd8
SHA512343a53eb604f1625e639aacb246c0e6b3b13375c87f2a892dcb4c387c9755f1eec60cc9e5934414cf183ce619e11d178fc56eded071a2a5c1a34bd4efdd80027
-
Filesize
3.9MB
MD56d9c6bc5beca9eeaf937786b9bd884e8
SHA16ba692e5315bcedcefdcd5d829ec9981bb72f27a
SHA2568224ddf9590e6a0db2ffd0c89531e164c21be1660bebc953217c35155ec4bc57
SHA512f20bd7c67a5ce2e341c07459b8d37283b3c139988f04a36eb1417c87b4287bc9bad974f33f5107c615385ec58b099f47e45fc682f6d78eb920f0a80f79e475d5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\extensions\65ffxtbr@FromDocToPDF_65.com\bootstrap.js
Filesize20KB
MD50893b06e5c3e70ba1241c49a980a7d3f
SHA1bc1a2b25a955999bdb11cb3349aa17a2ff4d9acc
SHA2561657ef07c715b6e7896c8055dfa5bac9d21e90b15dd8c33d0a0643d714dfbbb1
SHA5124a1ffbc5b4761afaa6ffef09bb548ae4b6a6e23f458dd72b226fd749e2fd77d755083e1cae77a979684c835a20d81c8fd91f941ecad331289af6ffe14c2d5ae6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\extensions\65ffxtbr@FromDocToPDF_65.com\chrome.manifest
Filesize1024B
MD508eafec8bd0861f8059bd959045da3a1
SHA19cbb7292f4393eac53948180b51aa3bf870b9ea3
SHA25639aa248351be9d19782ff4ff67628ab80add27d4676cee993bf6b6b7a7b3bc5a
SHA51228b10ebb52fb1c33a2f787a84e30906d72356bd1c604a2ad5107800d57cc3ed8d10a188ee58c6bf5b2465f6f18e234c314944c967534862955266b0e62f2ebd7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\extensions\65ffxtbr@FromDocToPDF_65.com\install.rdf
Filesize2KB
MD587b3652a701afccca1ce0cde6e7158d2
SHA1407be41fc1b14a565781cc83f2880f7408d9114e
SHA25627b2a08476f2312b45504e191bdcec55c096b82623be7dc76758fd9a34cada32
SHA512c5eab160eb7cbc1e98ca2e794c506c7a7a2ff948f9bec1e379cc791830627769665c58d3dad52a26f67c75b8101253d70a23a4835621f5ee55685c0308f7b341
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\extensions\65ffxtbr@FromDocToPDF_65.com\installKeys.js
Filesize206B
MD5f93047935655306d0fbb9ad17fa46198
SHA1c9e7996e2c1927136b818c9928865e9cfeabf776
SHA25651e5d2f45b81f848fecfd742e71a818dd418b28bcad0ff42d89142e2794795cb
SHA51239594e2758eacb3d47bd543c7d49df69863003eaed6410ec0050194803af7fee3fd11fe97d6d971f6682640af4453ee6de5c9e52bd57fe083b580912169748d0
-
Filesize
43KB
MD5fb85f333d10b1475650c4304f99a1ece
SHA18ace75f6c2417666ad9d60837b72d78b394c3944
SHA256bed200cccbab9d0b7f5ff299b74a0ff52731366da956960fc3ea45edaaf9cb10
SHA512715af74edd2b66cad493a7f0c9a72a8ea9984dbc267ea05b4e4f8a7d987eef32779d1574c4ad95f8c00dcb60dd57d10f1a274402618b394ff5b1a185a5edfb20
-
Filesize
41KB
MD5622fcf264119f7df127be353f796b319
SHA156cf4f2ac44c6add5cdcd419ba4b99d22dc7a0e3
SHA2566689d8f62f860178685496ef45520967afaeff94cfbcc64cf77074f21577e0a2
SHA51257b261c5b9f30d6fc7da6ee70200c22cd07d11b94bf9107fba7fe793195112ce90b34bcc7774adf87de00b0abbc621602e7e164caf28975056d952d0eb1d7c6c
-
Filesize
29KB
MD535d6caaa9e4d82974a74dbdb53801f98
SHA10f78fe90af015b0a511ede007bd1791a341e891e
SHA2565418b7bb40b097da6370ada1194f8b2d2d3eefa3ca36a6eb31d39df7791a25a3
SHA512bdace57d273841bb476289d6fe9803c57a48ab7ce630b8797f848f6eb7816b00b43223fd28c8caa440b1b1d027a2dcf3cc9cee007fcf5905650d15e800c8b245
-
Filesize
536KB
MD5f6dc4156b10629b1bcb37152d3523326
SHA1630d5fc9acc4932c87263895f554f8c3cb6d4b4a
SHA256468546874c24817222da03ae6308005a4ce3243b2d0559d88c5466837e8aadda
SHA512b11deb0863535e0aeb5a9cad6e9add49b3f74020857e4df29cb8755377dd1fd487a66edce1f2a74a2bb521314f72c9430c704a85501b7548618d4e28219f3265
-
Filesize
285KB
MD5205a514bd9275ac0e837c7ac1a80edf5
SHA1374e378a91209732b48c8416d1e9805e98fdcfa9
SHA256bccb4c112435ac8ef6246d054c6b7e4254ff2532cf5cc3212f910de9d3803708
SHA512c0ed9c41765379e4ca0222825e02b088dd42d0bd9797f6948ca49ee9305aad95215e5a5194f2740347f18a4f8a9df535ad915d4577f3a2928b6ba9c3de9cd3a4
-
Filesize
67KB
MD5de7f03c3b7194eecdf0c9af3ae400d7c
SHA1cbf93e0f6ff8ae054c18bdbe477cbfaf9f467cf9
SHA25620c4ee40010959c2b74f5bae90fcf433e25f74de3907173293c3799f8c851c2e
SHA512354d0840f86113dde2d6247ec7830708c3fc79af19df1a676ab5c07f9e83583b628058ffe22742b85fec08b2a09e47ac7d129a7cfa4e414fae17436cc9c2c90d
-
Filesize
29KB
MD522ae719e91b4bfcdf6122d3e2a0f272e
SHA199df98dfef4b483889fa88162d20ee46340a5dbe
SHA2562529f6465570ac7f0b82613c694181cc10515ee045cfaa48dd7402e9b9d791bf
SHA51261028e30c28501f0c18c00ec8888cec3eade43b823a545608fc6ee9c6c2529723b5bede0cb2d4a016562a8ad4a59b1cf2b6ed00d1f745387ef9f15b05b63ce8f
-
Filesize
695KB
MD5f86336c978311761bc3e2a80b08d46bc
SHA11a77ea9e7975b74fb40a3b624896e30caa8ccc3e
SHA256f99827a6134d064f7fdd3582034c1e5c1af4d8fda796cae3070d29511f2c711e
SHA5121166d854345b11788df637d1b0af69914957dfdf0630816f58a8a2c482f9481038831e109ca3b63829ad2e5b280dbf5e31f635a35dc6aadc01d790febf0d2282
-
Filesize
150KB
MD56c0323f452235446604b1f54341e8bb8
SHA10ff3588ecb69d2b18c6faec012672ca2f60314f6
SHA2560911baadea3a57160214f794034afbe9fa54e633af633e51c73e39a013c629e8
SHA512da777a2030b81dbdf3bfb0c1aa4d937ff0285818872e340b9beb693e84b9632b990d23a135bf24bc2db1023f9e9fa69376e386817bd7da7ded69fc750ef58648
-
Filesize
33KB
MD5d3efe03300caf0fa2215206280d31220
SHA112ff3195bdaca5482034aac3c3e132d5ada421a9
SHA256b67d6eba635dc1cec42eec2d1a1ceee34e43cb3a55e6080b1a17d29af5d9cf08
SHA512a2e32cc4926e017f04a7feb3ed9da4a32741109b75ca845cdadc20b577c4d96f1de4d05e08466559c174b46731e0f8c35f305082c845f298c55779c6058e96a0
-
Filesize
97KB
MD570a6b86cb0a6a3f7b35421ec7b9f5b7f
SHA1baefcb03679575349e01668c4f0938643baaa022
SHA2560059d01f099fffa09373a6ead57f3cd1c6772667b9a7eeb6edabca3cd1963cf1
SHA5124d6cdd61afb68b3fe6b705c2298ce35a1e42834c17e4faae11413bda44f0739647b6d773e73b530046c37ec0e15d8687f7546c0cdf30dedf5b5ab2adbd8c427d
-
Filesize
49KB
MD58fb2c1103382577f8248d83e7487ea86
SHA10c88efcfa1c77d597111125a6c031ceb47b18ba7
SHA2562e274740283a6977d068baf1d1535d7e235fbcfc0b7f620cb87bd42e07d30344
SHA512bc5564d1129cfe1aa1a1c12ea180253807d132ddf4a442ddde12851b2250d77534fde7e2b7db88151707f5a6b29ed9b9f86e7c0fee2931f48d75846a408bbe52
-
Filesize
53KB
MD58d721a2bc356a862ac8b2349bbeb614c
SHA18090e240f528004402b29c11e5072bed79d95384
SHA2565dc33b6ae31bb0b277f6db3b983e4adf5c509646b574c0630864ef462c6626c3
SHA51257a61aef5c03e69ee26fc7baf3ae30198b95c28b0d8887e86015683c94ced7cb7e6a5cc310da13bb32d87f81ab33778c412d60f48a4f646e18d17242b609fb10
-
Filesize
89KB
MD5f18d8bcb38dfd1409cf19f3ebd3de3ea
SHA12ca2ea6cf1ad1fe87c25d4ab6b1c7729e48c6390
SHA256090686b394ebf791b262b97249b20083c6a78e6cb04847a3ba643eb64c5ff184
SHA512b251f89728dda4f7250d39c6875d5362a89076340df34fc04f5d03773c354b0297bce2d9d898c5359339bdba49620fb143d72b5d9a6ce4ef2ab33ddab57e73a7
-
Filesize
159KB
MD565871eaefe51bf6ba0731f4fc62c2f55
SHA1eaa9d46b8fab8f3d48bb239adfe46ba312434017
SHA25672d7cb57c8de250ebe3fe65317957b9045a09c4a70d0751f016230f321d0a3f6
SHA5129e72a3b07de65773e654b433e28ea0189a96d3656ca518948738c6e02edbeb5ea65779699d94490a7589735aa65988287b390a7639b11b1cea226c04262267b9
-
Filesize
81KB
MD56df45cd8b40014f94f1a949fb96d3284
SHA1978867b422339e68971e56c49c66f14f2acd745d
SHA256c7a2447a749292e6aa3a8db104b46058af0f044ee376d6ca49a3764955d9b6b1
SHA512aacbf2c8cf9e06d94b622762d33d2f8614410589ef8f0e02b87006e74c7c0dddab1ebd9e6018b6857b34ffcf5100b896c2bf06067e3bde659972ef966a64d996
-
Filesize
33KB
MD5121fe87b463651d75c9bff704883c978
SHA1dc971c75ffce77cc952fb6660a2603e09d62d4d9
SHA256120b46557864c807dde6be7c0c1e71a2110d784a242dc79159945669d920fdb6
SHA51275337eb17c5db5276ecdc789e8e075376c18941047358e0946dc710580a5bbf2bf122d0c443e02e04f908bad18b5eb31c84b4e29a0676886af51d754b3bf1520
-
Filesize
41KB
MD5b315203e6d9995156946194516cf5332
SHA192ac05fff3ad68271062a3dcb87e12ee6b816ddb
SHA256aa30c65ee96701116138ebae7d1f0e831452a749f1f9724232a03e660ef13f51
SHA51283d897c787d37804dee112dac89c51066969c59b77080404da0c2f0cd36db478f0eed31f127bc1e636ce3ce4ca4b96a2fc8a4aa62d2da52336fff8d33762ce5d
-
Filesize
45KB
MD5896943b4b92b7e3f406844674f629076
SHA13eb4a6a25199e6339ec04f36189c71738de63ce7
SHA256f8274d77f804ad805806d531e940956d096f75c6b6b17f34a753f1cbce6c1632
SHA51235a39b00cf7e0da8b151a6261f833f12e442107157602d0a8cf991a424978158177203b79290f4b0ad8e6d0fee70e4655980727c3db3f26b249c49d98afa7e71
-
Filesize
157KB
MD592aad41d2e12e797af52d4bcd75cbed7
SHA1dfd07b722e317d1cddaab7d5b31bfab57cc5e739
SHA256a2122cc682e9155708a0a8c12d1e0935231c82a30f4ec1afe0245d8ea4c7e7f6
SHA512b005d8ed9d9413914a7c3b28277ab7b126843dcf2a4ca28e58c8e5cdb942d11384deb69cd7ecd5bb7d6ac9f5d593de36a5ded07bc8dc68f0b833ae3110276397
-
Filesize
1.2MB
MD5e83ba06c9fd18923c168a12e3f30e81d
SHA16902d246f8fc2457c9ae369b094292de6eb454bc
SHA256dce18833e08121db1bb9c56cc9229405ee13cb9b1961956bccfe7679cf929d45
SHA512eb6d0d601b6a1c8dfdddfe13c69e19eb4031afc34d0788cdb620211123d070e63a99fe7a5bdbbc1070550ea18b55e59273f0d73d6f0eaf1a1d502a491c7c4acb
-
Filesize
283KB
MD5500b47a48a172c0625692fdcc01b3889
SHA1244414d9d39e114e7989c3b35a5ff038508ecfc1
SHA256c62544ba1c451d590883230838373ee89838f6db2327ec4b5a5111460a8e3a49
SHA512e4677e9a16c3d45401b87443801f6ba69f57b5e9c1537abafbe80c6a98c08b5eba1a54f696fb6aa6fbe03209717d7e648e4a039acc8cc6e4e010c79586864718
-
Filesize
471KB
MD5511cda01fb8a730349e0d6577136e053
SHA16ff50369661027a1cd5f5e465f78c78913ff84cc
SHA2560f26dbb7816ed764d475cf640e88b21ee8ff38d2435e1f1ff357adfa03887449
SHA512edc2b90a8c67094fc500b3ffbfdfafc103a624ec41c3be9a25a242c92bee2a809e5d38d5940d2dade79e0c5f91071987970871b948ead7b5680565b4c722b695
-
Filesize
30KB
MD53a907490edf49cc5b49b69b145854483
SHA1ca556bcd15655e654aa4f4b1e155dd26d9869caf
SHA25676c263622b89f2fb8ac5ce387264c4989088cd0775f263bef1033fab58db30c0
SHA512f2eee0611974dcffb99bc2b9175770e8e108722fa602954c78996afda22dad3dfab6477037d1ac3e777ac655c4015b9c7110f207aa832b56e5c5b517bf008d40
-
Filesize
72KB
MD5995c45ccb72ab2efdd3f1602ad8ec907
SHA12f938d8c9a5d3c9c239793346d43193ba1cbfcd6
SHA25670e5d3fab80653f3a0d96f4c8ee0cd4034c4b1120b455313ddd1654027887c72
SHA51220f9009d8039004726409fa62296b2fc6f4a5b461426ad6d7736922f11cbbfffcbb42fb60ec731d239f723fe89ea64a0655f764ef018289fd6c1b01123be5040
-
Filesize
78KB
MD57f98949c5607f96114dd87a538f2b269
SHA1b8944722e8d577e67925dd4a72d1d8e44c3bc6ca
SHA256908e9d66885f2f3d610da9ad2e038acb26622969b2a8fad2da6ad7b0c2d69150
SHA512aa6a514e830567b9d71c09e61b160fd5766db051c18b8a08ee85c52b58fc939b381111bc641573f0c42676600ef9beca523a0acb1b74434ad0392080e8f5ae8a
-
Filesize
99KB
MD5e8298b19ec987061e98f83dff8c310be
SHA17bbff8810bb79104fe275fbbf7de48dcbd877e01
SHA256ef6c98b1f7aa59cea89f8756e7d2adf8f55de2bdf3f93bcbab542accaa1aa6aa
SHA51253389d996517ec00538e7afdd6d2f4b8d7a97dfb3e197c467ebfe3d791f48fd6a7263149f8433ad8bbf07fe0d8c4a61913426c3d5ea4e2a183f7633513f3690e
-
Filesize
9.2MB
MD57bea7852d578ee962c10b7b8dbf8a02b
SHA187deeea9749926f3a34d590086490a9ee9aea852
SHA25611847d6444198c7c8d7f960922c239fc3c1d07136f53b5d972f8623a56aa5fe9
SHA51202fdfb72f7cf216c30808de7dcaed5dddacc1160d1015c3a227725f281447faf259e685aee1d1d67b0b2abc4044d2f876b28a1245106d0739e10f6d0486a2d1f