Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 08:23
Static task
static1
Behavioral task
behavioral1
Sample
9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe
-
Size
208KB
-
MD5
9d8c90e3c00d723f8167d9e579b2eff1
-
SHA1
86f82bb7da52240469a520a1c4f166aa7beef579
-
SHA256
82358cfce8922a6d09b9c3ccb7867ce65556040592f238fd2939ba9507156d7b
-
SHA512
3bfedc755703b626c47a549ffe955433bc30ad10cdea7f0feb2d848e6a2d720f5cf973115b6d454549a86a83557dafdda67fec65a938353d1e12de947d5348e7
-
SSDEEP
6144:awHysFR5ERM05WQ8qpo0Qcs7ukLptsa6y/xG:RFR5KM63i0Y1d6OG
Malware Config
Extracted
C:\Users\Admin\Pictures\# DECRYPT MY FILES #.txt
cerber
http://52uo5k3t73ypjije.xmfru5.top/FAA6-34EB-13CB-006D-FC97
http://52uo5k3t73ypjije.vrid8l.top/FAA6-34EB-13CB-006D-FC97
http://52uo5k3t73ypjije.thyx30.top/FAA6-34EB-13CB-006D-FC97
http://52uo5k3t73ypjije.o08a6d.top/FAA6-34EB-13CB-006D-FC97
http://52uo5k3t73ypjije.onion.to/FAA6-34EB-13CB-006D-FC97
http://52uo5k3t73ypjije.onion/FAA6-34EB-13CB-006D-FC97
Extracted
C:\Users\Admin\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{7F378566-32CC-194C-63ED-AAB4EF64314A}\\choice.exe\"" 9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{7F378566-32CC-194C-63ED-AAB4EF64314A}\\choice.exe\"" choice.exe -
Contacts a large (514) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation choice.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\choice.lnk 9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\choice.lnk choice.exe -
Executes dropped EXE 4 IoCs
pid Process 3204 choice.exe 4272 choice.exe 336 choice.exe 3636 choice.exe -
Loads dropped DLL 9 IoCs
pid Process 3768 9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe 3768 9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe 3768 9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe 3204 choice.exe 3204 choice.exe 3204 choice.exe 336 choice.exe 336 choice.exe 336 choice.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\choice = "\"C:\\Users\\Admin\\AppData\\Roaming\\{7F378566-32CC-194C-63ED-AAB4EF64314A}\\choice.exe\"" 9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\choice = "\"C:\\Users\\Admin\\AppData\\Roaming\\{7F378566-32CC-194C-63ED-AAB4EF64314A}\\choice.exe\"" 9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\choice = "\"C:\\Users\\Admin\\AppData\\Roaming\\{7F378566-32CC-194C-63ED-AAB4EF64314A}\\choice.exe\"" choice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\choice = "\"C:\\Users\\Admin\\AppData\\Roaming\\{7F378566-32CC-194C-63ED-AAB4EF64314A}\\choice.exe\"" choice.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp88CE.bmp" choice.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3768 set thread context of 4768 3768 9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe 92 PID 3204 set thread context of 4272 3204 choice.exe 101 PID 336 set thread context of 3636 336 choice.exe 109 -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\indults 9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe File opened for modification C:\Windows\ 9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe File opened for modification C:\Windows\indults choice.exe File opened for modification C:\Windows\ choice.exe File opened for modification C:\Windows\indults choice.exe File opened for modification C:\Windows\ choice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x000700000002356d-57.dat nsis_installer_1 behavioral2/files/0x000700000002356d-57.dat nsis_installer_2 -
Kills process with taskkill 2 IoCs
pid Process 3120 taskkill.exe 972 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\Desktop 9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{7F378566-32CC-194C-63ED-AAB4EF64314A}\\choice.exe\"" 9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\Desktop choice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{7F378566-32CC-194C-63ED-AAB4EF64314A}\\choice.exe\"" choice.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings choice.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 632 PING.EXE 1648 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe 4272 choice.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4768 9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe Token: SeDebugPrivilege 3120 taskkill.exe Token: SeDebugPrivilege 4272 choice.exe Token: SeDebugPrivilege 3636 choice.exe Token: 33 1104 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1104 AUDIODG.EXE Token: SeDebugPrivilege 972 taskkill.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 3768 wrote to memory of 4768 3768 9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe 92 PID 3768 wrote to memory of 4768 3768 9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe 92 PID 3768 wrote to memory of 4768 3768 9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe 92 PID 3768 wrote to memory of 4768 3768 9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe 92 PID 3768 wrote to memory of 4768 3768 9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe 92 PID 3768 wrote to memory of 4768 3768 9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe 92 PID 3768 wrote to memory of 4768 3768 9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe 92 PID 3768 wrote to memory of 4768 3768 9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe 92 PID 3768 wrote to memory of 4768 3768 9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe 92 PID 3768 wrote to memory of 4768 3768 9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe 92 PID 4768 wrote to memory of 3204 4768 9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe 95 PID 4768 wrote to memory of 3204 4768 9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe 95 PID 4768 wrote to memory of 3204 4768 9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe 95 PID 4768 wrote to memory of 4208 4768 9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe 96 PID 4768 wrote to memory of 4208 4768 9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe 96 PID 4768 wrote to memory of 4208 4768 9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe 96 PID 4208 wrote to memory of 3120 4208 cmd.exe 98 PID 4208 wrote to memory of 3120 4208 cmd.exe 98 PID 4208 wrote to memory of 3120 4208 cmd.exe 98 PID 4208 wrote to memory of 632 4208 cmd.exe 100 PID 4208 wrote to memory of 632 4208 cmd.exe 100 PID 4208 wrote to memory of 632 4208 cmd.exe 100 PID 3204 wrote to memory of 4272 3204 choice.exe 101 PID 3204 wrote to memory of 4272 3204 choice.exe 101 PID 3204 wrote to memory of 4272 3204 choice.exe 101 PID 3204 wrote to memory of 4272 3204 choice.exe 101 PID 3204 wrote to memory of 4272 3204 choice.exe 101 PID 3204 wrote to memory of 4272 3204 choice.exe 101 PID 3204 wrote to memory of 4272 3204 choice.exe 101 PID 3204 wrote to memory of 4272 3204 choice.exe 101 PID 3204 wrote to memory of 4272 3204 choice.exe 101 PID 3204 wrote to memory of 4272 3204 choice.exe 101 PID 336 wrote to memory of 3636 336 choice.exe 109 PID 336 wrote to memory of 3636 336 choice.exe 109 PID 336 wrote to memory of 3636 336 choice.exe 109 PID 336 wrote to memory of 3636 336 choice.exe 109 PID 336 wrote to memory of 3636 336 choice.exe 109 PID 336 wrote to memory of 3636 336 choice.exe 109 PID 336 wrote to memory of 3636 336 choice.exe 109 PID 336 wrote to memory of 3636 336 choice.exe 109 PID 336 wrote to memory of 3636 336 choice.exe 109 PID 336 wrote to memory of 3636 336 choice.exe 109 PID 4272 wrote to memory of 1864 4272 choice.exe 110 PID 4272 wrote to memory of 1864 4272 choice.exe 110 PID 4272 wrote to memory of 4940 4272 choice.exe 111 PID 4272 wrote to memory of 4940 4272 choice.exe 111 PID 4272 wrote to memory of 820 4272 choice.exe 117 PID 4272 wrote to memory of 820 4272 choice.exe 117 PID 4272 wrote to memory of 1504 4272 choice.exe 119 PID 4272 wrote to memory of 1504 4272 choice.exe 119 PID 4272 wrote to memory of 3908 4272 choice.exe 122 PID 4272 wrote to memory of 3908 4272 choice.exe 122 PID 3908 wrote to memory of 972 3908 cmd.exe 124 PID 3908 wrote to memory of 972 3908 cmd.exe 124 PID 3908 wrote to memory of 1648 3908 cmd.exe 126 PID 3908 wrote to memory of 1648 3908 cmd.exe 126
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Roaming\{7F378566-32CC-194C-63ED-AAB4EF64314A}\choice.exe"C:\Users\Admin\AppData\Roaming\{7F378566-32CC-194C-63ED-AAB4EF64314A}\choice.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Roaming\{7F378566-32CC-194C-63ED-AAB4EF64314A}\choice.exe"C:\Users\Admin\AppData\Roaming\{7F378566-32CC-194C-63ED-AAB4EF64314A}\choice.exe"4⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html5⤵PID:1864
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt5⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://52uo5k3t73ypjije.xmfru5.top/FAA6-34EB-13CB-006D-FC97?auto5⤵PID:820
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"5⤵PID:1504
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "choice.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{7F378566-32CC-194C-63ED-AAB4EF64314A}\choice.exe" > NUL5⤵
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "choice.exe"6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:972
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.16⤵
- Runs ping.exe
PID:1648
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe" > NUL3⤵
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "9d8c90e3c00d723f8167d9e579b2eff1_JaffaCakes118.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3120
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:632
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4488,i,13035806169561352434,1332896185314862791,262144 --variations-seed-version --mojo-platform-channel-handle=4172 /prefetch:81⤵PID:3216
-
C:\Users\Admin\AppData\Roaming\{7F378566-32CC-194C-63ED-AAB4EF64314A}\choice.exeC:\Users\Admin\AppData\Roaming\{7F378566-32CC-194C-63ED-AAB4EF64314A}\choice.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Users\Admin\AppData\Roaming\{7F378566-32CC-194C-63ED-AAB4EF64314A}\choice.exeC:\Users\Admin\AppData\Roaming\{7F378566-32CC-194C-63ED-AAB4EF64314A}\choice.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --field-trial-handle=4892,i,13035806169561352434,1332896185314862791,262144 --variations-seed-version --mojo-platform-channel-handle=3900 /prefetch:11⤵PID:4404
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=3776,i,13035806169561352434,1332896185314862791,262144 --variations-seed-version --mojo-platform-channel-handle=3708 /prefetch:11⤵PID:1184
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --field-trial-handle=5264,i,13035806169561352434,1332896185314862791,262144 --variations-seed-version --mojo-platform-channel-handle=5280 /prefetch:11⤵PID:3212
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=5416,i,13035806169561352434,1332896185314862791,262144 --variations-seed-version --mojo-platform-channel-handle=5436 /prefetch:81⤵PID:3064
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --no-appcompat-clear --field-trial-handle=5444,i,13035806169561352434,1332896185314862791,262144 --variations-seed-version --mojo-platform-channel-handle=5484 /prefetch:81⤵PID:4592
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --field-trial-handle=5872,i,13035806169561352434,1332896185314862791,262144 --variations-seed-version --mojo-platform-channel-handle=5908 /prefetch:11⤵PID:3720
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4c8 0x32c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1104
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --field-trial-handle=6072,i,13035806169561352434,1332896185314862791,262144 --variations-seed-version --mojo-platform-channel-handle=6540 /prefetch:11⤵PID:2152
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --field-trial-handle=6684,i,13035806169561352434,1332896185314862791,262144 --variations-seed-version --mojo-platform-channel-handle=4764 /prefetch:11⤵PID:1860
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --field-trial-handle=6680,i,13035806169561352434,1332896185314862791,262144 --variations-seed-version --mojo-platform-channel-handle=6668 /prefetch:11⤵PID:4836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD52f83dc5164414f11ce01ae616bce45d5
SHA113cd4727b084dc2a781c1ae00f6abdd4d59431b4
SHA25656aa8d2bc56806ab09a48b193aa062597480a180d05b83fb07f87c9e0342b753
SHA51296edf5886a3ef30c594e19c1a7379ca33c28756d20c403d32bc4f3aa8d30fc5570cb1c85a4869ae3033c850a87f029d1b1f3e70f16e975c25c784d73e675922e
-
Filesize
11KB
MD5a436db0c473a087eb61ff5c53c34ba27
SHA165ea67e424e75f5065132b539c8b2eda88aa0506
SHA25675ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49
SHA512908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d
-
Filesize
44B
MD5095927e02e3f4d31c7a0d402d954eeb0
SHA1803e7a7f8eb4eb6220e9edc57743ade2ecd8f38b
SHA256f0cd807dcd8825ce23b4897a3f3a436c1174c8a4e7431a6547bb3399699f429d
SHA5127eed3a7147f13e6a46ea8abaa0eed8a985fbd42f83f11da14fffd38c850fe52202cd00b23d3b0f063255cbcc5896266b02f892ec49e3990b7d7c332f08536f77
-
Filesize
514B
MD5da7cbdc5f6821b87749e272c18f8f493
SHA1ef8d741c8aa6226af657a35a53d45207c6ab5397
SHA2563ae026844a141af506a4d96b8886a54a82954e331739630cd64ed2cd390f1c89
SHA512c904a57ad128bb7efbdc2c773c130b42545daa6be2acf78be7df43761d80f3220b25146026a56f6d28d5dfca8aee071815077424c5a1b608c361c587d03d80c6
-
Filesize
1KB
MD5394a5c0cee0392d04fad577c6766f06b
SHA116197acb33ddc2e8c5d1f7fc04aaa0cf1f26b95f
SHA256ed1e1c39e647d0aa8b950c98ff6ba2e7d551927263e45d4ba86b8747ce5149ee
SHA5129027e504499d057097c2b149ae3743519178cb570c48d4f0dd5cc735554199ad2525915af3b8e4ff1bafc471ebe3cefcd4760fc6c2c5a9e8f7bfde5805a89397
-
Filesize
182B
MD5b5b01ac30aabb5394aef7a5990ca6970
SHA1bcf8aa98d01da8815b4c0326ea8b821fd9581135
SHA256527beb88aae27bf244bcec8d7312a3a1da9d7ff3e64581919eb4563023c38b6e
SHA512df2f5f55eb2f8409c975a09c72a48e353f1127432d2af5f4c4e917e317e0a748759e1dd75460b765d9edd8cb7d5df012db34fa2d3a4c7da2e1c644bf9777330a
-
Filesize
137B
MD5363e53a22cdb004b03995cf78e815a8f
SHA1d208a235652a1ef85b4a93b24e39fb149a85dc1a
SHA256d49bcf72f9babb8d1ab2777a178befcdf98bd2f8deaccdbfac38142d6c66403b
SHA512d727d389eac6d86dbb6423b299830ef1c090fa556cb42fb1605539165cd719b63cecb309182bef140c9b9f1974b729b18b60d3114feb344e3555f09c533efba4
-
Filesize
1KB
MD5000f1aa3dde140d63ffb7c3a0bb9c3fa
SHA18897e631ed08248fbde270c7ce87cc2d2d078766
SHA25627a661ab3534b748e9725a567628e8341c26f8fa1eb157eb9027c68a40c3146c
SHA512a7bf610832e4412e65116eeebf279008834add76df92491c7aaed63669a465421e26d36febc3f3b846cd047b125550b3e70c5e6a9737a2eaa0e0347a1dd9ac62
-
Filesize
62KB
MD5cfcc7cbe898a4dd7253abc4cc006a758
SHA17c4cd864fe923dd2e183b2a1703ca189b735dafb
SHA256c940e7b49156e6ec0b9a9b02684676ac1c30691c2c229cb7e814904079ca5266
SHA5121118e10e5dcb833e232e401bfd946416b5be251519291d392e12227228d79600f61ff742badc398b09ca8ec07f2b8bcaee3cff225396234bf9b974485de5af20
-
Filesize
63KB
MD5d78e31e10c0b0c68765773608df893a0
SHA1a67b4d1190699ec20106d91a3abaa02658740aa0
SHA2562a2f12ddb70f5e4cf39e67163892820bc2f6297bfc5c4f17ca634fd287d87dc6
SHA512385e9d2f7ad4066c2de373597c7ef914eada5f94bb340b1c112fe0c5f27ddade166d2a9ff52171bf30fe1ee1937a81b26a0d06962627179c7819644be3157624
-
Filesize
4KB
MD5e6f2520cedb0df21cc115a52eb3f7758
SHA127d37567e0739177af8915ebfd1d3f17fe53d52d
SHA256daf6ffb3678d5e74a87aa550af9bd34c6e049562a771b38fcc39d5f8ec1df45a
SHA512ea91d35f654f1275dfd437ffd44ebe8b2ec5690f32ee78c2507ebb807570306f20b18b22085a4592c215458885fb9dfbff5919f93ca19fe8e0be94cd425d8060
-
Filesize
27B
MD51938fcd1b8813ea5f8fe611478d4c1b5
SHA1d87706b8193657bce53322e59b3c206533017d83
SHA256461a256119989ebfb392a6a6afa560213254420b1d4f89d97fa3690fc5c0fc4e
SHA512def3e9c92266a3af6be1753872286aa8dd624c4a76b8f3f180596a748f5bf6d7bdd965dd43b13120a4ed784f4628b5a1e6d7e9e12da15179d2b47e72994c323e
-
Filesize
181B
MD519e3e555a0bf6693f27ade2fcfa43102
SHA16828a357dad7c26383ece0bdbb515e5c4fecd684
SHA25602bbe02800132003ce473ffbe9e602034651d4edf71df3dd3a11014c1edc9ec0
SHA512a55f49380db70d26db07e54ed05597b060ffbcddf33f2e49c6479e27981df301460ab1ead6d895df5241593eb13d4b7379ce20acc07e5e9ccdc617ea3409d1aa
-
Filesize
321B
MD5f3b291c8ac4ce814ff455a1dedb752e6
SHA13699971fcdad24b65695219e582b97de04bd06a5
SHA2560b9971842c858a61f0749a18a06a795139ee9f55038d23b9826f6b579d560dc3
SHA5128cece8f0b1ad2a6c93f17334fc130f913e6f3c0877d93d00e706ae2d9d9ce4077101522c1b540b4bc05924c0c5e0438e67ffea9647964cd73d193ae0f8c2b056
-
Filesize
3KB
MD5c8534d0727f789f79ee8ed9a53f50eba
SHA19ab9d675826468231141ffa9a59d7d3d869aebad
SHA25601fd53799d28cb81f81efc1330d268957e14d5eaf75f5dcf8c0136c573635901
SHA51272a2837254562ec278bc147103809c572f0d9757ab98d86cd444d571764aa3ef2655f24a138512faee488583319455698887affda4cc40b3a4a1ca62864b78c7
-
Filesize
1KB
MD58ec4b2cbba583fad1c9dbab95eadecdd
SHA15a9cc205daae7774b6b45cdcd984e056eb798e4a
SHA256540c5bdb0518da9c9aa8ca10e3c90e1ed5c7f84183a681b412b6455fa7369333
SHA51209d8babc7b08e4a884d44811372edc1a986b7aadad9584041ef07e8dd1c0e33ab38921b368b9b9a00de9dbdb3c8d9a3abfa263f2ccf0c58258399f7c0d856311
-
Filesize
3KB
MD520d29eb0b3b8a16b89fb56f6630b8ce8
SHA10e18841b5b89ac09516d51fae248f9310bc62471
SHA256629b46aa2ea449a091e38e0636b8e7904fa98a6ce79af2834509354f1b10f959
SHA512703bb92267913b49ba3aaf1e629ecd4ba3ec5d85b525c4acceae1abebf7438e8dac5e769f1f545228c878507e011e1ae7dfd89667e5d04deb9dc541773257eb4
-
Filesize
126KB
MD5e8eb25e0d58d365613e5118107f7eb32
SHA1f252611d8da0c8c2f2eefc00a1990fe734e1c138
SHA256dd4372b30ff4f96b2012f97fd58fc0252ea280dba543a39e764edc02c03af3cb
SHA512249946e79033e0f7ad7efc1a95ed259653e1f4cd0dba441388c0ed99667f29aa07121752ef593b0b92ca848ed04d5e4e661d033834150d0ad83d695bd8ed56a3
-
Filesize
1KB
MD532e3dc04489957ff2f219a593d690ac1
SHA1e2d58b548411c28726cbd8cda24c52de70e58f02
SHA256dcdc03e72032593a902b8027a332d219d7dac3ee503bd6be5bc6a380db9a955e
SHA512c8af52140de7a107bb8ef7770e80519a8a4063bb093ea0697af99ac4bd8e7c1ecea8a9570717dd5f8243aa97712dea9741651673c411309ded8b2a437594e731
-
Filesize
28KB
MD51e9011ed3232d3a7142d8896606f524e
SHA156370a185a5de3d9019a39d3f97226cb5fe1352f
SHA256e9581869c22c1fdbf547b4356c1f399283d7c9d3244ca32862373b8b0f11e6c5
SHA51239b13c932344d70cc54a6ee3843936a25373d77c2335e8f5e3d7d11f5a0b3b6d14989e13c0fc3809148cf4c8d0d91666130abfc1d3507e3c7c03c6e545a9cc5b
-
Filesize
3KB
MD5ee605850778b585f63c6382ab05e8112
SHA14463ca8edb3c221fd0bec825822d0f77b71d2e10
SHA256583e9114740dd5e71aec0a4bab86d644c1856a3008d248f41502fc4368b62398
SHA512ab521ba8d4b06b0d440d80a50b2439ec983a26df943021c82a9cabf931c352e11e6f8e12c5b97ffaed30ea60bf989c04fe5e96237cab6dc06241c19a4464e50b
-
Filesize
2KB
MD52706a9691f646f678220600f5a3da66d
SHA118aca6b122fb4eeb132ff80378a3ebc5c7e76acb
SHA2565709aef07360ffe1cc827e1f77d0c23d5eb97d5f328ac8293911aa888dcf4ba0
SHA5128263f29d2dc33e2060c8c4b5ca34abff26a3c79c08e019f9b3eb3d8cc6504f26786a65ea20ae968ae5f42dda9c6a446a4394ca0886003c50bfc068b9009609b6
-
Filesize
197B
MD56c0fb6fd9810560e7b438cdf662c2734
SHA126304263ffc6724e5bd5a0dc440d74f233bc2fa2
SHA256bff0a0f00c9adb0ac7bcc8421882b4bcd0fb5b47d278ed64cd661ec7dce51cde
SHA512d85b9b780ef0ecac44e9af6ca0c766c04dcbc22cf3bf65efd23395806042d8cdadebbe088d21a0be75b37b2c6ddeb7aa726483c9b139d4284ef6b51101ca8c8b
-
Filesize
4KB
MD50675ddae39995e21081a699d62da24d5
SHA1369166f6793892f2e6690e95dd68da65015ef07c
SHA25640f8f3a3ae7dab8b8b00147ae9b4dbb0611cd15636a15dced3b90d21c14edf1f
SHA512900015de142233f3bbe870a6c697d18d2f587a5c6d1e965daa0807d6a5cd311d2eb605ca3aa89f9e650913d476a18cf8b4a74afa84acda4cd63c4939ea284d94
-
Filesize
1KB
MD552c969a3814d887034bbd308839b39e6
SHA176990e9aba806f033c75af3e61c54f5aff35bba0
SHA256de01f6b82723db2b995bd31ce510d27f55c699404330989b923662281e726e9e
SHA5120f6fd0891432ab71a0f7358bd6cecd41d37ccf1450e0c56bb48ec058cb74e10cc680341b2ccd653449c83969873c5f217fc16d4831e3bf7123177e0584932309
-
Filesize
2KB
MD54cb40bdad1a43c4fb89f7b4400076efc
SHA1ab2a3689957a412dbd3cd7f83e5aa35d44055941
SHA2561bb2e1d63f0787ad9a0e0ad8b3987c42f74d873211f440e6338f78bfa62d4ee0
SHA5120e444c130721fa155e28af88b21c0badced98ea2f1fd0df915cf07e4cf4b6d364e24a5babff81ad3246c5839595df520dc3e4d9a13635903f0e5ab4dc795a840
-
Filesize
1KB
MD5223909ceffcf7dd92a90656a0a1eb1af
SHA172557996dce6cabab827b4e7d1bafc94574beafa
SHA256c49d10ccada76693da2aeadadfff385359732ff5ef4f01bc662150564c892ff3
SHA5122d5ed9519276d244b7e8c98c11a1e9c572a6d76a9caa4c71e8dac2a87ae1d338490682a7cf27f44965f26dda96b0fb033555328b1ab0394817074c2e12b21a83
-
Filesize
2KB
MD55a7fb700d24dc20ca7e86ac88c7898ac
SHA150edfb37e364b1b1d22a3fc51d317d7ace27ccec
SHA25642a28dd4821b43368002876179a593aee7a2eb4912074d84ac6d3f3dab4b7211
SHA512144fda85daed37c7f43847abab93273d1b3114784def313c81ef165ed4ec85ff72c504c14005afb89e40ca863dbaa04dfe6fc74021d1592786415606122867df
-
Filesize
3KB
MD5823c348a508c32bc7d16d568126c34fb
SHA12b2f4bf49a7d8454474bf185e26b2c48cf43e461
SHA2564f84fda6a4dc46d8577474025df6fead475e5ce750de8177ce51031b82b7221a
SHA512c80ad925af22645a6ee1766036ff1841350387683db6210fff36c6f5fe321855e77aa50c765a3be4319b8a66032a14bb98655c31184ccc2dcf217a4e12df2842
-
Filesize
1KB
MD561bb87909569420e9d889bd076a11aef
SHA1668909823ee96cd46b76ffb4aba97e2335dd65da
SHA256386b26bffa39406bea409f57f8d332a590856554373b073b7b5b340d5e68eaca
SHA512fc873eb58c1a25f830ff3571b863c0da371f751d75052d3e77d1b94bb5ccead606ca19aaa73621467bbbc86aef817cfb9c9150f04af18f1c87846fc31f81f03d
-
Filesize
1KB
MD52be2fa3d1cd7438ceac3bb0fabff57f0
SHA106566068deddd781890d3ecb5a9e9fe087f763c5
SHA2563b0ff6b401c23a915b4dc05a8cf26f0825a93aa1f569da6bbc1a6195d4904ef5
SHA512cc95871dddc3a7c241f1a919787035f32bd644e9a369a8af43673b9822ad7d9722888dde35a4eb725e152e0f351c1f639b6d0a867534673b93340bf37fb62668
-
Filesize
689B
MD52168a573d0d45bd2f9a89b8236453d61
SHA130733f525b9d191ac4720041a49fc2d17f4c99a1
SHA2568ee173565b2e771fecf3b471a79bdf072aaa1bd9dc27582cfda2b2a322beeba8
SHA5121263589e12f587143ec1dd8ac87293a041f7d77439fcf91503e62be02e36d13e28560342deed86cf800c7bc01cd31837004d1ebe7ae53c670340040c68eb0e22
-
Filesize
922B
MD5054b78215f249c0bdb4a66dc5194ff6b
SHA1b7375a86ea0bc22a5a2033ea92eb0435e5a6c0d4
SHA2564acce89219d39f8e1f024bd6e90f93936afc4899821cf0674548f96a80815fb9
SHA512e59c92ff9198afa690a61d789379e6cc448156c20a673e948066dbf97446bf2f11533516d92deba0b865b8b6460b785646cab9970234aada7fda02fdac15fca8
-
Filesize
46B
MD54d86c60fba2c17060dc3ea905619a4f9
SHA11d7c6fb8779b9a6e18036d3fc20be4311be1e54a
SHA256486162bd4d51d4ad263da28d8ffd288e75d5228e015f041702c9c295179689ba
SHA5126af5f1f4a26f8eda819acf1af36758b83ed5fee5e58c67e4fb7cb4253b75c74aea36169231662f1aa746d85cd91e66951134958bed5e4812caa5aa4a397a39da
-
Filesize
208KB
MD59d8c90e3c00d723f8167d9e579b2eff1
SHA186f82bb7da52240469a520a1c4f166aa7beef579
SHA25682358cfce8922a6d09b9c3ccb7867ce65556040592f238fd2939ba9507156d7b
SHA5123bfedc755703b626c47a549ffe955433bc30ad10cdea7f0feb2d848e6a2d720f5cf973115b6d454549a86a83557dafdda67fec65a938353d1e12de947d5348e7
-
Filesize
10KB
MD5e7b3a3bd570a907928c3393acbf11de5
SHA12bd845cfdf2a2ac4cd7e9b19edfe8caea3a23216
SHA2564fcbd1147d178a92dbd741a9a791bd2d45829bb04c8fb4a6e399b136aada9211
SHA512af6f1142eb8e01f9b369a8caa3b38ed8441ab50b0a368101ed060f8ff6afda3d20d84f43240be10488676ac885b79e47e29e4546ec6ca5da79f0ddb06bbe7556
-
Filesize
90B
MD5b5c475e3db39298f6bfbb38b308b5151
SHA1364f99cb4a3298463e31bbd30d8ebdf13acdbefd
SHA25648ba49a2bfec24f1e539fbd8a8c681f5408e434ec244cdb92120404e63974c20
SHA5122b86ef9214a7dc770bac4dce2f325a3ddc6c8954ca7fcab6ac41e8ccd86ad9e50755e2bca11616de08a1d2ed6576a97be08d3b15f5995367c64e6c2d576bc6f8
-
Filesize
234B
MD56f84dbf74ef41dc3d861f5fb3e0f45ff
SHA13e5f17e9b9589f33ce6add7f2518a666ff2253a4
SHA256df5f432d7e0d2bd1c4dddb1fabbf1e77bd1065b9020f71abaf1a45fbb950bbb8
SHA5129f9ec25b815be7b20df26244d31848c9a4896b130241b63636d63511a290eaad78d289a9bb04592c0ba31492064671351b4c7359310f03469e27764132a20a5a