Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2024, 11:32
Static task
static1
Behavioral task
behavioral1
Sample
19f43731a3f1196b4ec28c31fa33bbc9_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
19f43731a3f1196b4ec28c31fa33bbc9_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
19f43731a3f1196b4ec28c31fa33bbc9_JaffaCakes118.exe
-
Size
6.3MB
-
MD5
19f43731a3f1196b4ec28c31fa33bbc9
-
SHA1
31f21a5aa8bedb8723515838c42f620ed89efb9a
-
SHA256
d0c360cfdc6424d75bc061e34df9954511ddd2c91e0578cb0838e35707422831
-
SHA512
609b13dbad032a97765dd2752749d8fe6cd2f187abafefd5079811bb98651274b6152c769207c00b51a4fea290cd05ac8995d0e6ef4a1d82bf883dcebb0ca2ca
-
SSDEEP
196608:XiSMut6ZUrTjHd/FEwHyAemUvv0/GVuTHky:7Mut6ufXL1Uvc/Ggv
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x00070000000233e9-8.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 19f43731a3f1196b4ec28c31fa33bbc9_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 4916 EXK.exe 888 Realeza Web Script 4.0.exe -
Loads dropped DLL 3 IoCs
pid Process 4916 EXK.exe 4000 19f43731a3f1196b4ec28c31fa33bbc9_JaffaCakes118.exe 888 Realeza Web Script 4.0.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\EXK Start = "C:\\Windows\\SysWOW64\\JURVDJ\\EXK.exe" EXK.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\JURVDJ\EXK.004 19f43731a3f1196b4ec28c31fa33bbc9_JaffaCakes118.exe File created C:\Windows\SysWOW64\JURVDJ\EXK.001 19f43731a3f1196b4ec28c31fa33bbc9_JaffaCakes118.exe File created C:\Windows\SysWOW64\JURVDJ\EXK.002 19f43731a3f1196b4ec28c31fa33bbc9_JaffaCakes118.exe File created C:\Windows\SysWOW64\JURVDJ\AKV.exe 19f43731a3f1196b4ec28c31fa33bbc9_JaffaCakes118.exe File created C:\Windows\SysWOW64\JURVDJ\EXK.exe 19f43731a3f1196b4ec28c31fa33bbc9_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\JURVDJ\ EXK.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4368 msedge.exe 4368 msedge.exe 2608 msedge.exe 2608 msedge.exe 3424 identity_helper.exe 3424 identity_helper.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4916 EXK.exe Token: SeIncBasePriorityPrivilege 4916 EXK.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4916 EXK.exe 4916 EXK.exe 4916 EXK.exe 4916 EXK.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4000 wrote to memory of 4916 4000 19f43731a3f1196b4ec28c31fa33bbc9_JaffaCakes118.exe 81 PID 4000 wrote to memory of 4916 4000 19f43731a3f1196b4ec28c31fa33bbc9_JaffaCakes118.exe 81 PID 4000 wrote to memory of 4916 4000 19f43731a3f1196b4ec28c31fa33bbc9_JaffaCakes118.exe 81 PID 4000 wrote to memory of 888 4000 19f43731a3f1196b4ec28c31fa33bbc9_JaffaCakes118.exe 82 PID 4000 wrote to memory of 888 4000 19f43731a3f1196b4ec28c31fa33bbc9_JaffaCakes118.exe 82 PID 4000 wrote to memory of 888 4000 19f43731a3f1196b4ec28c31fa33bbc9_JaffaCakes118.exe 82 PID 888 wrote to memory of 2608 888 Realeza Web Script 4.0.exe 83 PID 888 wrote to memory of 2608 888 Realeza Web Script 4.0.exe 83 PID 2608 wrote to memory of 2392 2608 msedge.exe 84 PID 2608 wrote to memory of 2392 2608 msedge.exe 84 PID 888 wrote to memory of 2200 888 Realeza Web Script 4.0.exe 85 PID 888 wrote to memory of 2200 888 Realeza Web Script 4.0.exe 85 PID 2200 wrote to memory of 1904 2200 msedge.exe 86 PID 2200 wrote to memory of 1904 2200 msedge.exe 86 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4592 2608 msedge.exe 87 PID 2608 wrote to memory of 4368 2608 msedge.exe 88 PID 2608 wrote to memory of 4368 2608 msedge.exe 88 PID 2608 wrote to memory of 5096 2608 msedge.exe 89 PID 2608 wrote to memory of 5096 2608 msedge.exe 89 PID 2608 wrote to memory of 5096 2608 msedge.exe 89 PID 2608 wrote to memory of 5096 2608 msedge.exe 89 PID 2608 wrote to memory of 5096 2608 msedge.exe 89 PID 2608 wrote to memory of 5096 2608 msedge.exe 89 PID 2608 wrote to memory of 5096 2608 msedge.exe 89 PID 2608 wrote to memory of 5096 2608 msedge.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\19f43731a3f1196b4ec28c31fa33bbc9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\19f43731a3f1196b4ec28c31fa33bbc9_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\JURVDJ\EXK.exe"C:\Windows\system32\JURVDJ\EXK.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4916
-
-
C:\Users\Admin\AppData\Local\Temp\Realeza Web Script 4.0.exe"C:\Users\Admin\AppData\Local\Temp\Realeza Web Script 4.0.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.webcheats.org/3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcab8046f8,0x7ffcab804708,0x7ffcab8047184⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,14020207486279656398,3666042779669608400,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:24⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,14020207486279656398,3666042779669608400,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,14020207486279656398,3666042779669608400,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:84⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,14020207486279656398,3666042779669608400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3124 /prefetch:14⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,14020207486279656398,3666042779669608400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3136 /prefetch:14⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,14020207486279656398,3666042779669608400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:14⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,14020207486279656398,3666042779669608400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4404 /prefetch:14⤵PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,14020207486279656398,3666042779669608400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:14⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,14020207486279656398,3666042779669608400,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3364 /prefetch:84⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,14020207486279656398,3666042779669608400,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3364 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,14020207486279656398,3666042779669608400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4488 /prefetch:14⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,14020207486279656398,3666042779669608400,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:14⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,14020207486279656398,3666042779669608400,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:14⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,14020207486279656398,3666042779669608400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:14⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,14020207486279656398,3666042779669608400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:14⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,14020207486279656398,3666042779669608400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1760 /prefetch:14⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,14020207486279656398,3666042779669608400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:14⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,14020207486279656398,3666042779669608400,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5696 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:4964
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.realezacheats.com/forum/index.php?app=core&module=global§ion=register3⤵
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xdc,0x104,0x7ffcab8046f8,0x7ffcab804708,0x7ffcab8047184⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1452,13054089033150503566,12374588757614821240,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 /prefetch:34⤵PID:3936
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:664
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD50c621b249c3a0737c841f487e360de37
SHA19c1a57749f7864a7ed6643042c7bfd4589135bfd
SHA256ee0321137c814a1f6440dec2ed6cd3d98a7dc037072d5a3631161d00a6f831c4
SHA5126d96473e18ab7522c36cb7a79aecfa73126b71bd0c6d175b91db29e9b2a10478e3bd6cf043731af2ac8db3c73586b93b058eae7ad351a73523378086832dbc8c
-
Filesize
505B
MD5aa895a69d42c3526e1d8bd13c9a5cd12
SHA1dd4b4e257ba0b86a6d639cfee2276d5c795c93fc
SHA256346fad416ea71128352d43457084a2e7e529276b8bb9a2188951bb3ac103bcc8
SHA512cb8e3d8a3dceb7aa9c7552c1babfeae408fec747726adb1659576c8357ecb86cc1174ab2319414c78de720a9c2393876018eee483926c93f249b0cac50125c35
-
Filesize
6KB
MD5327315e737ef2958e5712dffeb418a4f
SHA1b137c8689d23a279f9b8e5b790846af7331282a5
SHA25683d9ab75f2474d1950effcebc86bd1b2624910a0a58b469c6bc04258b23441a3
SHA512065e551286cb732f6d8a1fa30b36b5e11fb014ebe8ccc08a2693499ffdc09b3efbbe431e53a316e08ef90ff9c69c940345ae31bd3be745d946a256e61a25e983
-
Filesize
6KB
MD5d3c782f0a2e4e1f13f3b5528ed336f9b
SHA1632a1c34696835a7393a4592632a2fc5856a8a28
SHA256683e6b3ea2b1315115d12ca858405c5d23177b33b22014ae28126a16d1a2c039
SHA512f5c2351503e3f20d99fa3cd8a6267b565e348aa14ccd822b373f3846a4a283f12ff7105047f4398a61f32a6453f2e34e34d5da56fd50a8c7a711d07518f3dd2d
-
Filesize
5KB
MD58f865461db78f95e2b12326ae8517f45
SHA115c7f1f29911cf5dd5c2136accd17475de5f6ee4
SHA2567df3bd9ba7061b1005c1f3d39378b6ca6dc7660746e0c2c92e51c695df007c54
SHA5122c020b766127cf7719ebd9849e185b6d44fec729fd5e2b7f2f43319139b1af09f5023321b5a8dcdb8fec7d62b87c8bc5212fc5dec41179d3eb17bebfb004627b
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5e87c63970536b089a4cf35128436e12b
SHA1fedf5dec08735cdda80387b7f2589e9cf8956250
SHA256a30115190d840870b67a2b0b17a6afbdd6ddf693c6989bc42d8bba7911a2ebcb
SHA512bd3646745b1534a07b6e110fa30a1d4c754744f340151e03cf1b10d4a6c9d69e74e16a15a139f28c7c404384ac287ab2d5f11914a609c5db45a69e0e18ebb172
-
Filesize
8KB
MD567bbf27c192c0be9f1e10d6031fb1e6c
SHA1d848aa7a055762343ec2d3d92e1649153430289b
SHA256dcce916bff9255705b36a48c6b068a0eb375df1123061f58376f16e0334c9d09
SHA512bd98afc0cd83071d5ed884d7c269a9046ae5074aaf3ab0e33b87f7f67a493acbdc480236be49f69c7c22c0c5efc7a7f052944d6dcddd09f2390c1a681b422ebf
-
Filesize
6.0MB
MD5c32e0838b47d1a0204bd8657dff2ae48
SHA1554f6bd642631e9350a63b6c6c9ce21e48a32dc0
SHA2566c2d920d038cc2c948d725212f04b5f4200e28db3986e106e03506e79560390e
SHA5121c02e4cbfaced6871786548f4de83cfa85978d06331e84a4c6ffaf9ed38c116bba42206ee5d5f2d83249708127042ec3caf121988e54651b885bac0411b0eecc
-
Filesize
456KB
MD551507d91d43683b9c4b8fafeb4d888f8
SHA1ead2f68338da7af4720378cd46133589fc9405ba
SHA25671b3aecefd36e4855a369019ac5871c544d39f8889d23cd455466a24cdecce6b
SHA512a5a7ff3f8ffb72719b7e2c9dc2719c99ea32bd68994918ea027c0d7d54cfe0c80bfd34486dd8d3cdd390376bc4c8d1f7d97de4b98b7d39a3e10c3e2682c07d1c
-
Filesize
61KB
MD5383d5f5d4240d590e7dec3f7312a4ac7
SHA1f6bcade8d37afb80cf52a89b3e84683f4643fbce
SHA2567e87f6817b17a75106d34ce9884c40ddfb381bf8f2013930916498d1df0a6422
SHA512e652c41ec95d653940b869426bc2cbd8e5b3159110ffaab7d623e23eebe1f34ca65be6a9a9cdcd5f41aec7567469d6b4d6362d24ae92267cddb8940e1265806a
-
Filesize
43KB
MD593df156c4bd9d7341f4c4a4847616a69
SHA1c7663b32c3c8e247bc16b51aff87b45484652dc1
SHA256e55b6eabf0f99b90bd4cf3777c25813bded7b6fc5c9955188c8aa5224d299c3e
SHA512ed2e98c5fd1f0d49e5bac8baa515d489c89f8d42772ae05e4b7a32da8f06d511adad27867034ca0865beae9f78223e95c7d0f826154fc663f2fab9bd61e36e35
-
Filesize
1KB
MD56968eba88e953df126e109af99807266
SHA1142cd85e4dd694541c575c7e1575b680cc65210d
SHA2565098781fc13d49847acb63bcb8f566ef2160c512a41ba272222436db649e9fd1
SHA5129f82e0510423f3c2f3573d95670df2198f408dc2f0ca64bf10eea4e265c15115eb9ecc980693b758958e48603741ec4deb7876b4fe25a3ef179469140df84fe5
-
Filesize
1.7MB
MD53cd29c0df98a7aeb69a9692843ca3edb
SHA17c86aea093f1979d18901bd1b89a2b02a60ac3e2
SHA2565a37cd66508fa3fc85ae547de3498e709bd45167cb57f5e9b271dc3a1cb71a32
SHA512e78f3206b1878e8db1766d4038a375bbebcbcdb8d1b0a0cb9b0dc72c54881392b9c27e2864ad9118702da58f203f13e0ad5d230980ad1ef2370391a2c4acffc9