Analysis
-
max time kernel
149s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 16:38
Static task
static1
Behavioral task
behavioral1
Sample
be47b31a70b0efca7bbf8d4fbd9a7245_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
be47b31a70b0efca7bbf8d4fbd9a7245_JaffaCakes118.dll
-
Size
150KB
-
MD5
be47b31a70b0efca7bbf8d4fbd9a7245
-
SHA1
1ab8b4c0e11d28d17d6ec42a0b1f8a2aa0285c4c
-
SHA256
09c5ac29ccd986a5dc0b0ad0b2f5d16e234acfa4620653a9b1b378ad7e75c540
-
SHA512
bdefb53cbeacfc6a081203444a29165b8cbdc13c350b334e159103f8a94828c043643737ff58340fe7f0ec4c925e66d11a53be417a05af747413a4b453caa30e
-
SSDEEP
3072:Z0BFpMyls+IDbm77hvlSoTUORW8/BIlPkKj4efFJyG:2fU+Uq7hvP6ycrj4WT
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exeexplorer.exenotepad.exeIEXPLORE.EXEnotepad.exeregsvr32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 20 IoCs
Processes:
regsvr32.exerundll32.exenotepad.exenotepad.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 4 IoCs
Processes:
regsvr32.exerundll32.exenotepad.exenotepad.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe -
Processes:
iexplore.exeexplorer.exerundll32.exenotepad.exenotepad.exeregsvr32.exeIEXPLORE.EXEdescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20d70eefa145db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439405767" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002db57c1948329346ab6f3693a54edcff000000000200000000001066000000010000200000002153a0ede67929124fb2f1492c2eea8532636eaec395b25505bed35aaf96abbd000000000e8000000002000020000000aef83c38e0239a302deaaf50a209044c3808c2085eadc74778eb6df2961c8250200000009ae50afb8bd6689dcc57732dcf89f8aa87d157797525b6811ff311af1475008740000000e96b0a9476d187038edba0d825a98e6935a47fff8a279ab1bf448271091cea704e4139f33fe94ffee31e1cd0b2ffc489d89fd86439d4d870e870bfc720223f2e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0121DA71-B195-11EF-A429-7A64CBF9805C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Modifies registry class 5 IoCs
Processes:
explorer.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exerundll32.exenotepad.exenotepad.exepid Process 3052 regsvr32.exe 1944 rundll32.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 1896 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe 2944 notepad.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
Processes:
iexplore.exectfmon.exepid Process 2740 iexplore.exe 2740 iexplore.exe 2740 iexplore.exe 2740 iexplore.exe 2740 iexplore.exe 2740 iexplore.exe 2740 iexplore.exe 2740 iexplore.exe 2740 iexplore.exe 2740 iexplore.exe 2952 ctfmon.exe 2952 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid Process 2740 iexplore.exe 2740 iexplore.exe 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
regsvr32.exeregsvr32.exerundll32.exeexplorer.exeiexplore.exedescription pid Process procid_target PID 2780 wrote to memory of 3052 2780 regsvr32.exe 30 PID 2780 wrote to memory of 3052 2780 regsvr32.exe 30 PID 2780 wrote to memory of 3052 2780 regsvr32.exe 30 PID 2780 wrote to memory of 3052 2780 regsvr32.exe 30 PID 2780 wrote to memory of 3052 2780 regsvr32.exe 30 PID 2780 wrote to memory of 3052 2780 regsvr32.exe 30 PID 2780 wrote to memory of 3052 2780 regsvr32.exe 30 PID 3052 wrote to memory of 1944 3052 regsvr32.exe 31 PID 3052 wrote to memory of 1944 3052 regsvr32.exe 31 PID 3052 wrote to memory of 1944 3052 regsvr32.exe 31 PID 3052 wrote to memory of 1944 3052 regsvr32.exe 31 PID 3052 wrote to memory of 1944 3052 regsvr32.exe 31 PID 3052 wrote to memory of 1944 3052 regsvr32.exe 31 PID 3052 wrote to memory of 1944 3052 regsvr32.exe 31 PID 1944 wrote to memory of 2824 1944 rundll32.exe 32 PID 1944 wrote to memory of 2824 1944 rundll32.exe 32 PID 1944 wrote to memory of 2824 1944 rundll32.exe 32 PID 1944 wrote to memory of 2824 1944 rundll32.exe 32 PID 1944 wrote to memory of 2944 1944 rundll32.exe 33 PID 1944 wrote to memory of 2944 1944 rundll32.exe 33 PID 1944 wrote to memory of 2944 1944 rundll32.exe 33 PID 1944 wrote to memory of 2944 1944 rundll32.exe 33 PID 2132 wrote to memory of 2952 2132 explorer.exe 35 PID 2132 wrote to memory of 2952 2132 explorer.exe 35 PID 2132 wrote to memory of 2952 2132 explorer.exe 35 PID 1944 wrote to memory of 2944 1944 rundll32.exe 33 PID 2740 wrote to memory of 2268 2740 iexplore.exe 37 PID 2740 wrote to memory of 2268 2740 iexplore.exe 37 PID 2740 wrote to memory of 2268 2740 iexplore.exe 37 PID 2740 wrote to memory of 2268 2740 iexplore.exe 37 PID 1944 wrote to memory of 1896 1944 rundll32.exe 38 PID 1944 wrote to memory of 1896 1944 rundll32.exe 38 PID 1944 wrote to memory of 1896 1944 rundll32.exe 38 PID 1944 wrote to memory of 1896 1944 rundll32.exe 38 PID 1944 wrote to memory of 1896 1944 rundll32.exe 38
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\be47b31a70b0efca7bbf8d4fbd9a7245_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\be47b31a70b0efca7bbf8d4fbd9a7245_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\be47b31a70b0efca7bbf8d4fbd9a7245_JaffaCakes118.dll,SuppS3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- System Location Discovery: System Language Discovery
PID:2824
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2944
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:2952
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bc76317646586f3162959a175499726
SHA189a5cd0a66953a0d4adb16d94cc82ec851d86d07
SHA25633aacf8fd33ef24680669f68472ebd73d304fc3bb31817935db58f9cb419983f
SHA512d34ebd750e4e21f940f88291c9f44635ae9844acd50e07a7ef8a0e7be6f06dea973c59f888bd0e2873e90e22878f1a95767d5e246111f2f67fb60fa75fb94982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b6260acebc0485a0e7c9d3974d7b171
SHA1dbd362333556a2ff262bd60ffa684370b9bbb1d6
SHA256d8c3c410369306f1922aebb2b8bafbf6c1d70631a0cff246c3ee802ae8bfc95a
SHA512fa27a9839a1391c98d9696b9bbe982fb1d675a103f45da80b1f2f7ad8a52ae004b5e928b73082652c2654283eadae742e4be25b1b9e7fe2d89742a3481afe371
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516f14587f98c2fc45b92f0b7bb7f0cc7
SHA10eb88428d8caa1dc6e27e6a181348d442366b70d
SHA256458abbcdb2574461339720f9f5f7237cecb998cd4a9ad292b10719312b1f635d
SHA512d87d3ebbe3c6f9fc7fd4d7340168cfae006191b347973ab260479b5c66736b3080529dbc7aa9477db5fd92622cbbfceaecf723a5d855aeffc8df6b80b6247209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570d6a98b58b136b29cb47ff00dc2eae9
SHA10cd9a97e7157ca487f89d558a6877ad3ff68b6a1
SHA25693d8780ea2f9584c93c76f263030b91fba9396555cac1f1379293b07ab7c44b8
SHA5120d25273e5142a7bf4bba6c86ea16238d3419190b05ce6f119ee5d1d3a73121aad5dab4cb08ecad2c96095ec9b71ff95d0216d703ab878c17389c75dcdd066f98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d16402326296d32076342114047cccfb
SHA10b77f26fcf3792f1e58a2dc88d242ca7ba9fbd66
SHA256fc8b5f0827e5e2e0ffd3b67d8dcffdc05f1ad7575964ca0b20c692f258269899
SHA5126ffca171524b495057014881050422eae45d453048317fb57e3267d6e6e5f993439463235f59d6737214b3495f9bd61b1462828769f34eadd52963a82494e31b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5794308840cea393c121118faa5104c4a
SHA1ad5f8addf0dd07d958e93ac5db22ba8a185386c4
SHA256a3f9541bb35924361417a00cc1953cb33107966fe4f6de0e1c322e2aa33b9ab4
SHA5120683359ee0c5eaae079b9e0ae992d64a67beeb96242366e89e56214f01b3a2d93512897074247c75a5bc07aca971abc95b75330ba0312c74452ccd1d41e5ba75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffcd47fc4ce1ab3ce0b563f16c91ad62
SHA1334af4252eb78fb6117c9f7d8ff732caba375a58
SHA2564cf77d555b4b72c4d96ed262ccf17245e6f5cf4ff6b2ac1268a007f083a3cf85
SHA512395e0007abb19a2d831d41a5827e5f7a3c56e0696ade2daca475a0e008444ed55f0aab392238812df6bedbcb367a3d5ee82df86a6257fe4c652365cce4c29cdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b390d3957afd49e553f2062e93af3a2
SHA177809f88992fc166881ae62e86b5c32d244eb673
SHA2569dc4b4efcee17e8285693dfbbb2036705bfbf115a0d6394b6006177c670912f9
SHA5125f59a65fb471e5bbdd97fa68b3bd7cb9060ca6d67374321796f5ef852536ad41879e4de8228f26e14fda7396dd094ba4083d7e5b60bf219b553848c0a9721800
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d116cf8d9f30a8bb434d25898933f4b
SHA15118dc717b12b1bcc90905ec779a7b2fc5513f4a
SHA256e3979e46206474db435932d97e35a9bc940881364995c5cb3f11d839ae4e514d
SHA51200df790697b1681ca5d67fa4b76bd83830eb075bacc6ee47ff1c0e308e446d775b10c7afa9ff415ce3f8f1b20dcde19aeca4a81d513182d4393a8d3c50ce09f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d5a3294d352abdb7068eed11002bdf1
SHA1c3164c99012aa6cd3a32a76cfabc66567db2f8bc
SHA25616f58295f992ad3bb6781e6ce3731990b74e3a60f14059e8dd4c4bb1670d0dfe
SHA512e457722917df9c37dfaa734714389cf2046ac616e649ac3510acc4999d7f769fb96636c2caacebd56bd6efcb5ee061afc385ecd5a758a66dc68c3f725386d2b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f26b78954f8ae26ca3d8bab274ab5d23
SHA1a4a0e4e7cee85b3b7e4e67e8be4d6bd60066a2d7
SHA2561e540db32332f6a44514adf0c1f6f67088c8963683a0300aa818e56ac904f4a9
SHA512cb8bf38325f8713e08dc14891e3366be3e60a5abdd51b2d59a9a6347ce3dae37a4d35b841da863b594f971a9d468ffe5ea6ec785254fdc831178431aa417b3f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f92ea9f71027a7127a0cd3685bcc64e4
SHA154f2ad099a236445e8c683c36cc8850195c0e9e4
SHA25645847868df9ce692220efd7894df7e43ac1f37b915d774ada62907820f749a99
SHA5126b05e045ef67f0c7b713abc4883ed56a97fd1fe7457a8fa64ec74fbc579f1d6b20272d1fadf78ca7d76cdce1164ee52111d7a32b324d3e7f9c53fb890e7ef64b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b96d10f9befb19264604c53253e6d35b
SHA118c6a3d32618149bfab670887c1d9895c8b77611
SHA256bbdd427e1bd7210c14744aaa76db3eadbac5d72b2f5ce8d2c46f8920c8fed778
SHA512ee2c23355573a853e68613d54d19810b252fd239cee5c22a99ac0b79a0121ac08466c51f44a11c6fabcdd9ddbbcdbab3c29debdfa5f861c27f5f1ce40ed5f91a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506872ef038b8f924f3164c46568990c2
SHA180add59aba32f2e7a9b6790a38d6042aa34881b6
SHA2569fc27687ad10675ebf862cff19c64e9ed183343da12e69cd67a2b5c9fe63c4b4
SHA5127659e4bcff5fb765d563ede5e177343a967e24939dbd501c6c25202ede7920ce0e2506a259117c4ac40da3e2fd9cb2f59ebebf2d53e5c8604c95eb46f1de2682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536402e89c8063380ce65174ffba15bdc
SHA1859033b6ea70a1566a01e4399e2d33e9bd057491
SHA2564baecc747a8d4055b111b58e0d170a23e41f752e18eee96e2f2a9726ed217cb8
SHA512e8b57792abb81ada9dff6eec27caa18ebe7fbcfc865b9b324b192a78323c1d4a9eb7ac7695ade2ba210c854e58bca6f0fbd47b9fd44a880c3efd53b8201f29fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5839e29863f5a8995338856dde87f8df5
SHA188ab564094c09030d12c342e125c26204a2d194b
SHA256873e8fb66da6175dc2fd31bb903164d8f659703c211c5410015fc9a11d6c66b0
SHA5129616cc22476b395e9a9777f4e4bc53350687a57aef8c847f819560ad2aaceaa5a98802163bc9863f356d8e5699474e7bd4bc88bac2c9c1ca101d83f10a81bb60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ec1a812cffaea099f10287cba550257
SHA173ff6a0cead676a2d22988b5efb53c04b0349ab2
SHA256738f5a45d2e96c0ef008cc46abdd22a90a1a7c30b420ce0c969d90c42a22838b
SHA5128ad2ce7f3a7e0c8ba24370ed69892d8ce02751302a1a226ec8f70b583e53582023366a0073e059003e892d49a3983d8e513e667d8231290076a65893991d4b4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57debf9f996bd0b07512ec04f770cf799
SHA19056474933d3915b8b7be1709d9cb744963358f0
SHA25622736a88d94bcfef8820176447ad2b46375ab52e4e723fcfb6cc401be7a086ab
SHA512d2f0ec0f0ed778ff0bd9a32d5d5c52484a591bb77e8a59f072741963895613cadb0f855a0cbe00ebf07148b748ec6cfe513159ed3c6ddca385bb18e36bd7f83e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528d8ebe09e7c81bda9b16ca94226b860
SHA156b854a9959f376449d11799b2154e580212bc27
SHA256f268776a4bec46af37769c4ab87aa9af975acacd21fef4a4c38f3b7260f96272
SHA512bd1466e4a5384bc375566643624766cfb7b0d15e6acf6b7e07981bafc4b7fa131c884f6bebcdbde6ad23c1182dd8876bbaa4ed169d7357c3011a508c03bc9243
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b