Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 16:18
Static task
static1
Behavioral task
behavioral1
Sample
4310d664e629499a4fbfa199076842e3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4310d664e629499a4fbfa199076842e3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
4310d664e629499a4fbfa199076842e3_JaffaCakes118.exe
-
Size
2.5MB
-
MD5
4310d664e629499a4fbfa199076842e3
-
SHA1
bcbb89bcaa21715a012c09af3b500ff2e32bad00
-
SHA256
da2224f92edd04225d00c2616f9bc95760ec4689a553cdbeeea2bca2ae550958
-
SHA512
371fc466d670395e336dbd1a99aaff5a1075fe824d6e501955c1d76db8f8ef8558f29f64333fc9a048cf8ab24c39692c1d84d1eda8c00433dcdfaf0b769dca00
-
SSDEEP
49152:oaSDJLr+Be0SeBk2a5wL18ou9DjMYcOajZqOLBNwDaebA5rOYiZnO:otO0iaaB879Dj3cOodB+GebSivZnO
Malware Config
Signatures
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\DRIVERS\SETE7A1.tmp RUNDLL32.EXE File created C:\Windows\system32\DRIVERS\SETE7A1.tmp RUNDLL32.EXE File opened for modification C:\Windows\system32\DRIVERS\tbrdrv.sys RUNDLL32.EXE -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation Inbox.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation Inbox.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 9 IoCs
pid Process 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 568 Inbox.exe 4564 Inbox.exe 4544 Inbox.exe 2020 Inbox.exe 800 AGupdate.exe 1896 AGupdate.exe 3216 AGupdate.exe 3976 Inbox.exe -
Loads dropped DLL 6 IoCs
pid Process 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 3800 regsvr32.exe 1128 regsvr32.exe 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\InboxToolbar = "\"C:\\Program Files (x86)\\Inbox Toolbar\\Inbox.exe\" /STARTUP" Inbox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" RUNDLL32.EXE -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 6 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}\ regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}\NoExplorer = "1" regsvr32.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{D3D233D5-9F6D-436C-B6C7-E63F77503B30} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}\ regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}\NoExplorer = "1" regsvr32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{D3D233D5-9F6D-436C-B6C7-E63F77503B30} regsvr32.exe -
Drops file in Program Files directory 25 IoCs
description ioc Process File created C:\Program Files (x86)\Inbox Toolbar\Buttons\is-ADCU7.tmp 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp File created C:\Program Files (x86)\Inbox Toolbar\unins000.msg 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp File opened for modification C:\Program Files (x86)\Inbox Toolbar\Buttons\games_online_gb.xml Inbox.exe File opened for modification C:\Program Files (x86)\Inbox Toolbar\Driver\tbrdrv.cat Inbox.exe File opened for modification C:\Program Files (x86)\Inbox Toolbar\Driver\tbrdrv.sys Inbox.exe File created C:\Program Files (x86)\Inbox Toolbar\is-MEFUI.tmp 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp File created C:\Program Files (x86)\Inbox Toolbar\is-TTKK4.tmp 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp File created C:\Program Files (x86)\Inbox Toolbar\Buttons\is-KT3HN.tmp 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp File opened for modification C:\Program Files (x86)\Inbox Toolbar\unins000.dat 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp File opened for modification C:\Program Files (x86)\Inbox Toolbar\Buttons\games_portals_gb.xml Inbox.exe File opened for modification C:\Program Files (x86)\Inbox Toolbar\Buttons\games_search.xml Inbox.exe File opened for modification C:\Program Files (x86)\Inbox Toolbar\Inbox.ini Inbox.exe File opened for modification C:\Program Files (x86)\Inbox Toolbar\uninstall.ini Inbox.exe File created C:\Program Files (x86)\Inbox Toolbar\unins000.dat 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp File created C:\Program Files (x86)\Inbox Toolbar\is-8FB6U.tmp 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp File created C:\Program Files (x86)\Inbox Toolbar\is-LEOD6.tmp 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp File created C:\Program Files (x86)\Inbox Toolbar\is-7KPGP.tmp 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp File created C:\Program Files (x86)\Inbox Toolbar\Buttons\is-UNMM3.tmp 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp File created C:\Program Files (x86)\Inbox Toolbar\setupcfg.ini 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp File created C:\Program Files (x86)\Inbox Toolbar\Buttons\is-68SE3.tmp 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp File opened for modification C:\Program Files (x86)\Inbox Toolbar\setupcfg.ini 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp File opened for modification C:\Program Files (x86)\Inbox Toolbar\Buttons\black_green.xml Inbox.exe File opened for modification C:\Program Files (x86)\Inbox Toolbar\uninstall.ini 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp File created C:\Program Files (x86)\Inbox Toolbar\Driver\driver.cab Inbox.exe File opened for modification C:\Program Files (x86)\Inbox Toolbar\Driver\tbrdrv.inf Inbox.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Inbox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AGupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Inbox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AGupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AGupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Inbox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4310d664e629499a4fbfa199076842e3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Inbox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Inbox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435687754" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D7E97865-918F-41E4-9CD0-25AB1C574CE8} regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0061a9f0541edb01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "{C04B7D22-5AEC-4561-8F49-27F6269208F6}" Inbox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks\{D3D233D5-9F6D-436C-B6C7-E63F77503B30} Inbox.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\Approved Extensions regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "{C04B7D22-5AEC-4561-8F49-27F6269208F6}" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D7E97865-918F-41E4-9CD0-25AB1C574CE8} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\SearchScopes\{C04B7D22-5AEC-4561-8F49-27F6269208F6} Inbox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{C04B7D22-5AEC-4561-8F49-27F6269208F6}\DisplayName = "Inbox Search" Inbox.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{C04B7D22-5AEC-4561-8F49-27F6269208F6}\FaviconURLFallback = "http://www2.inbox.com/favicon.ico" Inbox.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31137364" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\User Preferences\2BB20B33B4171CDAAB6469225AE6A582ED33D7B488 = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000013f787289f1be14e87be8dc204ff715d0000000002000000000010660000000100002000000013903b91463212b9b73d2a648c11434d674299cea09928b3ed8b7c1452eb6101000000000e80000000020000200000007b934324392bcdb0033f4c53bed03dfce6784ad7456213439b31e32e5d46679710000000ff309af1f7757980c745a1e424fa535440000000afd8df865cba1453f6b88f04d1adaa2f4dc41fc36f0be29cd27d2d0241e1ee332377dc5ff44e87607de99fdbf7df64d315e0f87b5c66763acde56162e01de39e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}\AppPath = "C:\\Program Files (x86)\\Inbox Toolbar" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}\Policy = "3" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\User Preferences iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION Inbox.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Approved Extensions\{D3D233D5-9F6D-436C-B6C7-E63F77503B30} = 51667a6c4c1d3b35c52fc8cd52ca070fa8cda57f711a7828 regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{1B66E8C2-8A48-11EF-B319-EE8B2F3CE00B} = "0" iexplore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\IEWatsonEnabled = "0" regsvr32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar\{D7E97865-918F-41E4-9CD0-25AB1C574CE8} = 00 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{C04B7D22-5AEC-4561-8F49-27F6269208F6}\SuggestionsURL_JSON = "http://www.inbox.com/s.aspx?q={searchTerms}" Inbox.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000013f787289f1be14e87be8dc204ff715d00000000020000000000106600000001000020000000db451adc7fb7f6c5dcc7de66a2323a40d7b817733803775c689ca6cc86de4add000000000e80000000020000200000009c5cb14e5c6c50c3e0bc24f0a65f65d67576426d084e4945c51c23e48572823220000000d33cff73320a15cc568551842467094abe9cde4ae456cb83db5d329f51ac5e574000000021623b087488e44666d0836d24100edfd9bd441e2f1297b3f5e3755c566dc55485530996801410b8818a8b04fa251fdfc5fa42fe0ea77fd73ab0c71773810651 iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}\AppPath = "C:\\Program Files (x86)\\Inbox Toolbar" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D7E97865-918F-41E4-9CD0-25AB1C574CE8} regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\URLSearchHooks Inbox.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{612AD33D-9824-4E87-8396-92374E91C4BB}\Policy = "3" Inbox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}\AppName = "Inbox.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}\Policy = "3" regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{612AD33D-9824-4E87-8396-92374E91C4BB}\AppName = "Inbox.exe" Inbox.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{612AD33D-9824-4E87-8396-92374E91C4BB}\Policy = "3" Inbox.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\Main Inbox.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\ Inbox.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{D7E97865-918F-41E4-9CD0-25AB1C574CE8} = 00 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Approved Extensions\{D3D233D5-9F6D-436C-B6C7-E63F77503B30} = 51667a6c4c1d3b35c52fc8cd52ca070fa8cda57f711a7828 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}\AppPath = "C:\\Program Files (x86)\\Inbox Toolbar" regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31137364" iexplore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\IEWatsonEnabled = "0" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\Main\ Inbox.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Approved Extensions\{D7E97865-918F-41E4-9CD0-25AB1C574CE8} = 51667a6c4c1d3b357564f3c9b0c48f0d82da66eb1a1d0ff0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar regsvr32.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.inbox.com/homepage.aspx?tbid=80139&iwk=846&lng=en" Inbox.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}\ProgID\ = "Inbox.Toolbar" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C7C55C60-F5B5-40A3-A2E9-EC00E1FE08F3}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}\ = "&Inbox Toolbar" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Inbox.IBX404\Clsid\ = "{37540F19-DD4C-478B-B2DF-C19281BCAF27}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CE057E0D-2D7E-4DFF-A890-07BA69B8C762}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{042DA63B-0933-403D-9395-B49307691690}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Inbox.IBX404\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Inbox.IBX404\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CBEF8724-D080-4737-88DA-111EEC6651AA}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CE057E0D-2D7E-4DFF-A890-07BA69B8C762}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CE057E0D-2D7E-4DFF-A890-07BA69B8C762}\TypeLib\ = "{CBEF8724-D080-4737-88DA-111EEC6651AA}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{042DA63B-0933-403D-9395-B49307691690}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CBEF8724-D080-4737-88DA-111EEC6651AA}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CBEF8724-D080-4737-88DA-111EEC6651AA}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{042DA63B-0933-403D-9395-B49307691690}\Version\ = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C7C55C60-F5B5-40A3-A2E9-EC00E1FE08F3}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{615E8AA1-6BB8-4A3D-A1CC-373194DB612C}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\Inbox Toolbar\\" Inbox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C7C55C60-F5B5-40A3-A2E9-EC00E1FE08F3}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{042DA63B-0933-403D-9395-B49307691690}\Version regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{042DA63B-0933-403D-9395-B49307691690} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Inbox.JSServer2\Clsid\ = "{C7C55C60-F5B5-40A3-A2E9-EC00E1FE08F3}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{042DA63B-0933-403D-9395-B49307691690}\InprocServer32\ = "C:\\PROGRA~2\\INBOXT~1\\Inbox.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{042DA63B-0933-403D-9395-B49307691690}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}\ = "Inbox Toolbar" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C7C55C60-F5B5-40A3-A2E9-EC00E1FE08F3}\Version\ = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{612AD33D-9824-4E87-8396-92374E91C4BB} Inbox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Inbox.Toolbar\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{042DA63B-0933-403D-9395-B49307691690}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4}\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8FAE973C-3FE3-44BF-81F0-ADB0D42CE851}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" Inbox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{615E8AA1-6BB8-4A3D-A1CC-373194DB612C}\1.0\0\win32\ = "C:\\Program Files (x86)\\Inbox Toolbar\\Inbox.exe" Inbox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CBEF8724-D080-4737-88DA-111EEC6651AA}\1.0\0\win32\ = "C:\\Program Files (x86)\\Inbox Toolbar\\Inbox.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C7C55C60-F5B5-40A3-A2E9-EC00E1FE08F3}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}\InprocServer32\ = "C:\\PROGRA~2\\INBOXT~1\\Inbox64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PROTOCOLS\Handler\inbox\ = "inbox" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{615E8AA1-6BB8-4A3D-A1CC-373194DB612C}\1.0\FLAGS Inbox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C7C55C60-F5B5-40A3-A2E9-EC00E1FE08F3}\ProgID\ = "Inbox.JSServer2" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C7C55C60-F5B5-40A3-A2E9-EC00E1FE08F3}\Version\ = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CE057E0D-2D7E-4DFF-A890-07BA69B8C762}\ = "IJSServer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Inbox.AppServer Inbox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Inbox.JSServer2\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C7C55C60-F5B5-40A3-A2E9-EC00E1FE08F3}\TypeLib\ = "{CBEF8724-D080-4737-88DA-111EEC6651AA}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C7C55C60-F5B5-40A3-A2E9-EC00E1FE08F3}\Implemented Categories regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C7C55C60-F5B5-40A3-A2E9-EC00E1FE08F3}\Implemented Categories\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{042DA63B-0933-403D-9395-B49307691690}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C7C55C60-F5B5-40A3-A2E9-EC00E1FE08F3}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8FAE973C-3FE3-44BF-81F0-ADB0D42CE851}\ProxyStubClsid32 Inbox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C7C55C60-F5B5-40A3-A2E9-EC00E1FE08F3}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}\InprocServer32\ = "C:\\PROGRA~2\\INBOXT~1\\Inbox.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Inbox.Toolbar\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{28C3737A-32D1-492D-B76B-8D75EBBFB887}\ = "IAppServer" Inbox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0E56FAFA-1B09-480E-B653-4B23918DC58A}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0E56FAFA-1B09-480E-B653-4B23918DC58A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{042DA63B-0933-403D-9395-B49307691690}\TypeLib\ = "{CBEF8724-D080-4737-88DA-111EEC6651AA}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{37540F19-DD4C-478B-B2DF-C19281BCAF27}\ProgID\ = "Inbox.IBX404" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{042DA63B-0933-403D-9395-B49307691690}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8FAE973C-3FE3-44BF-81F0-ADB0D42CE851}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" Inbox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{042DA63B-0933-403D-9395-B49307691690}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Inbox.JSServer2\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{042DA63B-0933-403D-9395-B49307691690}\ProgID\ = "Inbox.JSServer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}\InProcServer32 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 676 Process not Found -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 2020 Inbox.exe 2020 Inbox.exe 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 2020 Inbox.exe 4728 iexplore.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2020 Inbox.exe 2020 Inbox.exe 2020 Inbox.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4728 iexplore.exe 4728 iexplore.exe 1176 IEXPLORE.EXE 1176 IEXPLORE.EXE 1176 IEXPLORE.EXE 1176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 4152 wrote to memory of 2384 4152 4310d664e629499a4fbfa199076842e3_JaffaCakes118.exe 86 PID 4152 wrote to memory of 2384 4152 4310d664e629499a4fbfa199076842e3_JaffaCakes118.exe 86 PID 4152 wrote to memory of 2384 4152 4310d664e629499a4fbfa199076842e3_JaffaCakes118.exe 86 PID 2384 wrote to memory of 568 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 101 PID 2384 wrote to memory of 568 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 101 PID 2384 wrote to memory of 568 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 101 PID 2384 wrote to memory of 4564 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 103 PID 2384 wrote to memory of 4564 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 103 PID 2384 wrote to memory of 4564 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 103 PID 2384 wrote to memory of 3800 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 105 PID 2384 wrote to memory of 3800 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 105 PID 2384 wrote to memory of 3800 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 105 PID 2384 wrote to memory of 1128 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 106 PID 2384 wrote to memory of 1128 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 106 PID 2384 wrote to memory of 4544 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 109 PID 2384 wrote to memory of 4544 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 109 PID 2384 wrote to memory of 4544 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 109 PID 4544 wrote to memory of 3272 4544 Inbox.exe 110 PID 4544 wrote to memory of 3272 4544 Inbox.exe 110 PID 3272 wrote to memory of 1964 3272 RUNDLL32.EXE 113 PID 3272 wrote to memory of 1964 3272 RUNDLL32.EXE 113 PID 1964 wrote to memory of 1580 1964 runonce.exe 115 PID 1964 wrote to memory of 1580 1964 runonce.exe 115 PID 4544 wrote to memory of 2020 4544 Inbox.exe 117 PID 4544 wrote to memory of 2020 4544 Inbox.exe 117 PID 4544 wrote to memory of 2020 4544 Inbox.exe 117 PID 2384 wrote to memory of 800 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 120 PID 2384 wrote to memory of 800 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 120 PID 2384 wrote to memory of 800 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 120 PID 2384 wrote to memory of 1896 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 121 PID 2384 wrote to memory of 1896 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 121 PID 2384 wrote to memory of 1896 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 121 PID 2384 wrote to memory of 3216 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 122 PID 2384 wrote to memory of 3216 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 122 PID 2384 wrote to memory of 3216 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 122 PID 2384 wrote to memory of 3976 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 123 PID 2384 wrote to memory of 3976 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 123 PID 2384 wrote to memory of 3976 2384 4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp 123 PID 3976 wrote to memory of 4728 3976 Inbox.exe 124 PID 3976 wrote to memory of 4728 3976 Inbox.exe 124 PID 4728 wrote to memory of 1176 4728 iexplore.exe 126 PID 4728 wrote to memory of 1176 4728 iexplore.exe 126 PID 4728 wrote to memory of 1176 4728 iexplore.exe 126
Processes
-
C:\Users\Admin\AppData\Local\Temp\4310d664e629499a4fbfa199076842e3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4310d664e629499a4fbfa199076842e3_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\is-8FUVN.tmp\4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-8FUVN.tmp\4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp" /SL5="$501D6,1888839,70144,C:\Users\Admin\AppData\Local\Temp\4310d664e629499a4fbfa199076842e3_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Inbox Toolbar\Inbox.exe"C:\Program Files (x86)\Inbox Toolbar\Inbox.exe" /regserver3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
PID:568
-
-
C:\Program Files (x86)\Inbox Toolbar\Inbox.exe"C:\Program Files (x86)\Inbox Toolbar\Inbox.exe" /install3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4564
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Inbox Toolbar\Inbox.dll"3⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
PID:3800
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Inbox Toolbar\Inbox64.dll"3⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:1128
-
-
C:\Program Files (x86)\Inbox Toolbar\Inbox.exe"C:\Program Files (x86)\Inbox Toolbar\Inbox.exe" /afterinstall3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\system32\RUNDLL32.EXE"C:\Windows\sysnative\RUNDLL32.EXE" SETUPAPI.DLL,InstallHinfSection DefaultInstall 128 C:\PROGRA~2\INBOXT~1\Driver\tbrdrv.inf4⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\system32\runonce.exe"C:\Windows\system32\runonce.exe" -r5⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\System32\grpconv.exe"C:\Windows\System32\grpconv.exe" -o6⤵PID:1580
-
-
-
-
C:\Program Files (x86)\Inbox Toolbar\Inbox.exe"C:\Program Files (x86)\Inbox Toolbar\Inbox.exe" /TRAY 04⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2020
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-MC7EU.tmp\AGupdate.exe"C:\Users\Admin\AppData\Local\Temp\is-MC7EU.tmp\AGupdate.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:800
-
-
C:\Users\Admin\AppData\Local\Temp\is-MC7EU.tmp\AGupdate.exe"C:\Users\Admin\AppData\Local\Temp\is-MC7EU.tmp\AGupdate.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1896
-
-
C:\Users\Admin\AppData\Local\Temp\is-MC7EU.tmp\AGupdate.exe"C:\Users\Admin\AppData\Local\Temp\is-MC7EU.tmp\AGupdate.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3216
-
-
C:\Program Files (x86)\Inbox Toolbar\Inbox.exe"C:\Program Files (x86)\Inbox Toolbar\Inbox.exe" /postinstall3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -noframemerging "http://toolbar.inbox.com/lp/inst.aspx?tname=Games&c=4&tbid=80139&iwk=846&addons=1&addonlist=&afa=3&lng=en"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4728 CREDAT:17410 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1176
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD501116f926b28cb3442473d8b47a6dd8f
SHA15303b4976d13bc6f3ffa0e3c443a0d36ea55fff4
SHA25601f5b90e46c63749261d30ab669b55b581ae0c41912b54b38f71c7dc2c454511
SHA512df6debe9debe900ff5338aa9d8637a6c887b9905a1fc77b6e2a50d3f8067cfa806e9fceb3d8d2a57b5b859346267048bca60c5f19d2bd9092f9c08a2d2859271
-
Filesize
4KB
MD504e1df757b9b5a6418d79d072db000ce
SHA1f118b45fa1092a7d473886b05984580dfa5eb5b8
SHA25620ddca93499bb0a82627577b4cac56b6bb4c0ccb2c10ad92d16bac8b09a96864
SHA512380eeaa2bd01629c7128a0971d6855f30d4e99bb9347d465a670419d8684585b1f7d52c6ea6e30d12bd7b0101ea1c9399c7e4f1f781db35c225f97a5e0d8d871
-
Filesize
4KB
MD54b3274899a510ce0a0eaa6427bfd2869
SHA1bbc6075fd32dbb95a254ceec0083f008113f7dc3
SHA2561799d52866f0579798e7817e9168017bfd5a0a6e452af848e1dbe7311324c0f6
SHA5124e9ebb12d5e6fa334bf7cb3dd4424036b3493958b9d6755fcaa5b61af9cc2898c588e6914b16298012b385cd0e890c024a607f120332c677f7b7d521952d4059
-
Filesize
3KB
MD5ccd6e298e340f9adc0e7359e9e924441
SHA187a1a8110e60fe6e0322e253170fb07c64dfc97b
SHA25681857ce2a92da97d87e489612c6b5a82fb37f2a5856a36b772764f7072452701
SHA5122bd078aaf07ece5a21c7353bd1843f9be60615775f19d1f14e0551c688b63bd21ac8c158230669f719180a724d64de9665720ba593323b87a638e3163ace5d17
-
Filesize
7KB
MD5dacf44f0b690f4c0053d31535fef87f2
SHA1d2318c6c771a4adddd507c2fa6aa7d81ebc7aca6
SHA2569175d7ad0f699049214a066e3b7672036a64354fbd88b002fb34f1d8c583d334
SHA51260c7e1f3fa5c5515907b4e2702b0ffc1f32129fc92c75653ab7591745d78f7fa59b0a6c505b21cedb36151d4ca4a0fa1b90f09f8d267f7c9bd91a9605a87b7ce
-
Filesize
1KB
MD5c84b4baaa44b8989b2e76b42c1ab5301
SHA136ee3212aec954e82fd73c914717c7ad32cfc367
SHA25694ecff1e1ce8d5d5ef349769ee4236d230a7f58dfbd0a7d32ebf84c2b41fcec8
SHA512230bab43937d5ec8600882b2ca6249b07fc580fea5b1c8817ede28fae6566bc78fb8f2088dc4dea0997e217c94659063dc3d2adff0405944b427d325ebe373a7
-
Filesize
35KB
MD5e7c0aac166d688ab41dff2f17e420a3a
SHA100b70a50af14b497cebd100344fafbd3a564fd5b
SHA256babb144ed6471079b6922914646a110f9fe5588ca3d94deeeda584c484e4ed26
SHA512fe539d89e28204b1d09607e9f0450ae619ff71efdfccb4597641a27cb3234fce1a2061e273bd8490c9bf15d19871aa93c1bf98c909b6c252549c40915d62721e
-
Filesize
1014KB
MD5cef98a42f1f86652b0ca1c31fdc2e288
SHA139d597dffab6d36bc47f21fe20f2eedba864a5ba
SHA25639490eab802f21e6d00ef5eef0e1532b69a64dbed537c39f6c6129c14b6406bb
SHA512498fe3191d3d9852c5d7ccd960847f24dc41af43cd2d4d05569b11a2b2f0b5b1c74d66ce520b58a7a6759bbc729d11dccfe5d0a1e6c5b2422ddd083adffae5e6
-
Filesize
2.3MB
MD57bfb9bd61a69e7a4717f34f22dae8b4e
SHA1a8b1ba82ee7172e9e5f184fef35bd41bdd373906
SHA256f8404bd34230c1db313e2659ea483e7640c10987917e2cebdd4dd9c4ae67a19d
SHA51219e6a0c065b1f6980b6927c6af5accf7b5d29f450daf37e57feb9ec901f3105cedd34e2129f2c5c320b516bd6a709a3b8a6885f4ee032e12dbae0dfd4b9a3273
-
Filesize
2KB
MD57e2839c0e98367690b3af21d6408aa17
SHA199d41f4b0c57b5e6ef1efa2350038e10d4188035
SHA2568cec384377ada9c4f9bfa6d03b8e6a2ed0dc650cad45b82594e11338458271ba
SHA512d637ad72dd205f47ba4a163a88eb503dfb24f03a4f0b0c01aef8c29dc49942679eb5db47a1c63ed042f1f1fecd06d8ca6121972f33360cce5b956c0fc530286a
-
Filesize
2KB
MD5565371d1e7f731b426c5e36e61d9f003
SHA1c7752a54f5ad38002ed6452c19570adc833f9e89
SHA256ac43b254a21613bce70efc92a047cec6c5b9d5c4d6a2ab231ca5fd3b3665520e
SHA512f498bfb9dc3016cf8be350b837d668441e0a4fd0611c1f28dff72f87d305ebbbf5656a8521245b7d388cff8a19d57ba1eb747f50d140beaab6a1902f66af0e92
-
Filesize
1.5MB
MD55c2c888c50585ade35e03fa261e6c7a3
SHA1228f8b2423945596d44892fff79cee851e725d89
SHA256b88171732c2054dbc64a1649430646eeaf7b5d63c491e515a66736aacbb7aba9
SHA512af463a375586f7a07f29c5855146be05ad74bd18fc90d46c653bc6911761b911472ab5bd7eab75a7bd8b9533704118d2d756368c74ccca7b88c4de294e8ee3d1
-
Filesize
1.2MB
MD567e866dbad2c21354f585086d3f3e5b2
SHA16b0ccd164c9108b01a81f249a2d9c05ed3b5f67b
SHA2566d7c851b4dc1acb135aa18ef28c5921472ca46d555358fc97bf2b10fc82ad8da
SHA512ff0945ec265d3c04335e3a0ab08737ae68ba893455ffa3fa9e45e73ae2d58df737d247827e6b110f904fb18dd40e0d45882655f43b17c6bccd88265ad2aa494e
-
Filesize
66B
MD5b084e06a7f942ae74c984674b59ab286
SHA16e5316501f88e432d7144b176f18202072146677
SHA256806847b184ad90a37e734caf5cddd9e9eff80099f24810312e666f49a060a83a
SHA512ab3194d6522f6592a28c3e583fc4cf63f3875287efbd9dafcb68be90239982b76b398569121a0317942b39956c28d8e93dd2a1c1f2bf568a9c3c88cc3ef2d04a
-
Filesize
30B
MD5129a4ce81f9a7b3dc2d98e090a069f05
SHA1a266de9a5f3fea40e7de85ddfde49f4b6c515c96
SHA2569ec3cb3f9a5f238ab518e7b57bcad1ca765c429fb37be15057da7eb9170541f7
SHA5123d15c7ddf93e944ed5ce634f35050f95989b1f1f35b4b8233e10658508f07953579c6dd62cced8efd22cf783c7e9565f39270e5bb46d2959a1312148af6414f2
-
Filesize
89B
MD596339d98a30c58ee7785f4f3d87b695f
SHA14c16cc8ecac6a5eb9f6e9df5ec120e49bf36e493
SHA2561002a24d46b6a7a6fd8a1c007e18bcd8c3126d7b61143cc995d1c05262f349ed
SHA5120f4a0cd146092218ca32eac7427173ab2aaaf52c22b5c1c6fcfda21e9b76ae1c3984da132e3a2363bba9de125c920740a908b7f8865f147898e7249ba63b737b
-
Filesize
119B
MD58ed0f33758e83f41443df65ffc614f9c
SHA1f865889a4bd5da514bcc7a689a9785268451e29e
SHA256f27e521eddd77cdf261cbec81d0db38b64e7358fc94fd87327543e888433275b
SHA512e9585968b0651e1ef042578fe19ab73e24c413732d34c5ebe3bd9a7fbf99394c7ae4767151ba25be1b03b258f09bc2913d56220a5489578c4470b847d1e48058
-
Filesize
173B
MD541c522b00e9d9c6bb62cf78080474177
SHA184c04a068887f2d2243062b579b0e6740c4cf803
SHA2567bd0fdf7cbc433c919ea4d27893fb90617b972f23f5c80c2f213502b4ef13402
SHA5126c7e486942472fe4d52319109c9fea2f68cb0f31cf2a1a9a09f0cd69118edbc0e54d98eda301f5e694071d2b61267d427cd9ca746f2abe6aad8807dc0b03734b
-
Filesize
210B
MD51bfafc87edfc54b5b5d8c6b99866900f
SHA164dc96d7d8cafa91da7af16095090b11d73112eb
SHA256256b70b47a943d08943819c40be014333bec2d1a163a70212ca0113380fde8c5
SHA512facf9b8a7cd6a2f18bf015413f207549dd6a2deb4269b2e8e16f8c2c4edfe7df19ae2b4c3d8468ee3f2369bc42fa1f93b991c27e23d825b05e9c6bc4893a822f
-
Filesize
243B
MD5b66ecbd801a3a7d8671a6178c9a75032
SHA16d22424e05e88a6f9910ec353c6da3dc5c085787
SHA25631ade048867ac94d488557cbc8696efa048f6110a74e904398af641cef8e98de
SHA5127b0112814f647ba3f9869ae76c2955f48df46c7de8214d292e2c2f390b4d1dc4a2b7a6d988a539581e66f7e988067f7e7370de8570c3d124009fc244dafa6350
-
Filesize
93KB
MD56aa650efb4605f4bb39bdcfd8a2198ba
SHA1da12240ffb9984e3f3d8e93a859bc8d768a242a4
SHA2568729058fc0a109bfaf82d84abdc954805cd46ed499ff235d5181ff3facdaf2cf
SHA5126893a2f796546c859c1a9ab2a8c1960f2606fe779a07bbe3cf3c0ebdb9579defa87c3b1d4dbb7e4934839a0cd5062255fb6d019bee11cf57e09b0cf350ce2819
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
Filesize
504B
MD58d26c59541600bc99c86ac8107839c76
SHA110f618005296484e687c1cc257092bc16c45a551
SHA256826cca040a832a43ff3ebbc2fcb89935fb6661b9c24f0618a8bcb7607ff6fb54
SHA5124379c3e14b5f3efa1c341b640e801f449724bfa3eb7a5e4edaecd4af233134351ba884f3105d45aa54692288973f57834d4ebff177b67b777bf0dc1fc176e4c2
-
Filesize
504B
MD5e49cbf003fd1bf3261a452e0903698c5
SHA1824d5990e3b2fd35890a7fd79aef2ddf2971c3d3
SHA256a66382fa0de352ba46c0005a7c92fde4c6d094007746feea72bdeb2a890680a5
SHA512e0af28d72b4152780ca083c7e6f2c386de9f18a8ae42577dad4122a84983c5c1e2a9c2b0c9f54083ed0443f0573ba8f50969c777d728673cfd8a80ce89a0df37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD54405383f9f9c4dcd1d63f201e707e09b
SHA1c69edf7fd641a45d3bb7d20cc530ae3225b5d0b1
SHA2568d94913b5f0d098130f3d3d14e54d6a635b267c6426ac55613d418452e84a4db
SHA51273caadb11b6149d5b352adde0618282369b8e3092cc409c791a38c0775298f354d4a4a178591e85c49ba5d0b22d0589919a2783c54c181cae94d49a94a83ebf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\832765B953AB3CF6C7F02DD7AAAC952E
Filesize546B
MD556702df23b488b0d9b2217c05d155d35
SHA1376ec6d3fd5bc6eb2033f8d77d90f0e2cf1aa301
SHA2566e58b5f36479fe6208d3d9ae3e159f9f43baebbad8f6d6192981dfdf6f1d1f29
SHA512d5a09a7d7b6dccd3e3a3c200bc1d444dad7d8d8a2239942cbd780a18cb79157eeb4646d10e2b9d6125d71a0210ede39d0654a0e0bfa81f9f0cebaf8abe64c197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B624848E7D0C04204BF0E664FB37FBEA
Filesize550B
MD5fd0ee7e6af637d4cbd7ea03711e02941
SHA1483224dcf227a94c7a36fd55d7330ea8c653b9d7
SHA256446fd79006e3944d7d5795bb14c2377109fd41acf99e5dbe393a0b9061b9c45e
SHA512394d8369459d4af4f93c70c50257c2791f3aa91b7f688910a6785936e6aae81a83fcf2cef4a16eed5a0bacd19e6fb4150d9e048d7e1c2ccd677b50bd4353ef2e
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
15KB
MD5b2057fe01e01c39312ac3ba7acaf6a83
SHA181ea52f1cdcd7049df0f392eca2dcb2884a92828
SHA25648e25ab527065a8e16608575b6151e049b7af217eee60a82f50cc692e829258c
SHA512416d8804fb9c662ed95ed7b7c6e85f5f638e410e2f14b73ba86619b19aebd386a208b88a88948f60ee2e395387cafaf38a24b28b5fc2a738e99d7979efb529c7
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
14KB
MD5de4c71e881f03193bb0884185b51bbdf
SHA18f51bb36b81298f9fb57824716539520553b77fe
SHA2561f8e952702b912ccb4326c9bfd76f4cb49459787a2955924798792c20ed45580
SHA512cf91b32ff05ce6fab615d727c6a1e25c9f4f08d51af5cadbba74650921333b0f0f3a0444a36c4c4ae77abd3ea54c846c8248af7cc0256c06ca4aabac457eced0
-
Filesize
1.2MB
MD5e7106fbf42fbc6d5b08a18ada4f781b4
SHA136d4a629f79d772c0b0df8bd2ae2ea09108d239d
SHA25664e1f1fa7d91920b17bc7bc679a4cd8d87ff5b104318b6921bb6bf6a19055635
SHA512adf876296a952aadeb4f25211c0939bf5a278809b5d3007ad7e26c5d4975e7684d242c1b3de796efd474a47cb7ecdb80f9047935924a1108bf0e4d7c973d1845
-
Filesize
873KB
MD5a3ccbbb0735800b89931b73ccb69f9b1
SHA153c70f80017eff22ad88a53fdb3ffc518354af59
SHA25697d0684ab1ecb2f89a3c8e53dc383aede506a1f9367aa283c0b9992a19854d43
SHA512e4461a7cf5e8b8e655a2985be672af25e44276b018b7b532a665f26c1a44032bbada7e5a071a78827020c3f18d9d5c79bd0f59fe97876b1eb4279ec4094f3704
-
Filesize
183KB
MD5db25dfdd4c1f2b65c68a230881072695
SHA194cd6a3438041f0e61b0a1bea7b66461854efe69
SHA2561b66aaf1e7e3c493dd96af3b7442ea60072f6e93ba45281eacd31a14ca7e7e73
SHA512db69e4ab2218856e5184d9094e7e39705b83e3efdc15225067205c8faf6e5836145364f1d509192defa3b48864e72b9f8c0f2dc53a7adb2b86c655318b7afc2c
-
Filesize
85B
MD500e9d0f34b3a913968be26c46c156644
SHA120e7a6b33595bc4444c696533f6182836d997aa6
SHA2567a837a30f1812197812e6a8a231034c51852d57f0a1e444b2bb5a33be6c1d83a
SHA512fcc04e08d263042c991a8d320f4720f4410b66ac365946dd6bcb1a829b7b129a073fa4b2180b06aae65f5a72ef431b8916d38f5866f9b739054bd71a7c224555