Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 06:46
Behavioral task
behavioral1
Sample
216eed107f28c9b994c12ce02cff2c03_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
216eed107f28c9b994c12ce02cff2c03_JaffaCakes118.exe
-
Size
168KB
-
MD5
216eed107f28c9b994c12ce02cff2c03
-
SHA1
4d60e3d161698c44848c332007e8eea9c9ac2f8e
-
SHA256
22bab8dd221a2884e1ceed9d147b7d3bc7c6c990598b8ad2d988d38368310416
-
SHA512
5cd881e169de12726a81642cfaa52d4db04f073d5d4eb20fac7ffc4e5069842c9c397513210e8eb4b3732e767ff5e518523b35343d0f1ada6489f18f10b021cd
-
SSDEEP
3072:HNM3HkPIrvRapjrXR7ddaIF/f9KBNvy5s6iChH0netat4:t6HkPIvQtXRhFYBNqst6Fat4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 216eed107f28c9b994c12ce02cff2c03_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation a.exe -
Executes dropped EXE 1 IoCs
pid Process 4668 a.exe -
Loads dropped DLL 1 IoCs
pid Process 4640 regsvr32.exe -
resource yara_rule behavioral2/memory/4780-0-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4780-41-0x0000000000400000-0x0000000000493000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D83E84DA-D187-4300-B5D7-727727352096} regsvr32.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\ajki.dll 216eed107f28c9b994c12ce02cff2c03_JaffaCakes118.exe File created C:\Windows\SysWOW64\a.exe 216eed107f28c9b994c12ce02cff2c03_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\a.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 60 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D83E84DA-D187-4300-B5D7-727727352096}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E062203C-7759-4B2F-8EE7-DF725EED1DB7}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D83E84DA-D187-4300-B5D7-727727352096}\ = "HACK.SPY" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B038F224-F9F5-4B83-A0D0-43D68D8E3CFE}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E062203C-7759-4B2F-8EE7-DF725EED1DB7}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ucjs0l.Bho\CurVer\ = "ZoooGoo" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D83E84DA-D187-4300-B5D7-727727352096}\InprocServer32\ = "C:\\Windows\\SysWow64\\ajki.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E062203C-7759-4B2F-8EE7-DF725EED1DB7}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B038F224-F9F5-4B83-A0D0-43D68D8E3CFE}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ZoooGoo\ = "HACK.SPY" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ucjs0l.Bho regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ucjs0l.Bho\CLSID\ = "{D83E84DA-D187-4300-B5D7-727727352096}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D83E84DA-D187-4300-B5D7-727727352096} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF}\1.0\ = "Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E062203C-7759-4B2F-8EE7-DF725EED1DB7}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E062203C-7759-4B2F-8EE7-DF725EED1DB7} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B038F224-F9F5-4B83-A0D0-43D68D8E3CFE}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D83E84DA-D187-4300-B5D7-727727352096}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E062203C-7759-4B2F-8EE7-DF725EED1DB7}\ = "_IBhoEvents" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E062203C-7759-4B2F-8EE7-DF725EED1DB7}\ = "_IBhoEvents" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E062203C-7759-4B2F-8EE7-DF725EED1DB7}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D83E84DA-D187-4300-B5D7-727727352096}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D83E84DA-D187-4300-B5D7-727727352096}\ProgID\ = "ZoooGoo" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B038F224-F9F5-4B83-A0D0-43D68D8E3CFE}\ = "IBho" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ZoooGoo\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ucjs0l.Bho\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B038F224-F9F5-4B83-A0D0-43D68D8E3CFE} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B038F224-F9F5-4B83-A0D0-43D68D8E3CFE}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D83E84DA-D187-4300-B5D7-727727352096}\VersionIndependentProgID\ = "ucjs0l.Bho" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E062203C-7759-4B2F-8EE7-DF725EED1DB7}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B038F224-F9F5-4B83-A0D0-43D68D8E3CFE}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B038F224-F9F5-4B83-A0D0-43D68D8E3CFE} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B038F224-F9F5-4B83-A0D0-43D68D8E3CFE}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D83E84DA-D187-4300-B5D7-727727352096}\TypeLib\ = "{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B038F224-F9F5-4B83-A0D0-43D68D8E3CFE}\ = "IBho" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B038F224-F9F5-4B83-A0D0-43D68D8E3CFE}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B038F224-F9F5-4B83-A0D0-43D68D8E3CFE}\TypeLib\ = "{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ZoooGoo regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E062203C-7759-4B2F-8EE7-DF725EED1DB7} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E062203C-7759-4B2F-8EE7-DF725EED1DB7}\TypeLib\ = "{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E062203C-7759-4B2F-8EE7-DF725EED1DB7}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ucjs0l.Bho\ = "HACK.SPY" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D83E84DA-D187-4300-B5D7-727727352096}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B038F224-F9F5-4B83-A0D0-43D68D8E3CFE}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ZoooGoo\CLSID\ = "{D83E84DA-D187-4300-B5D7-727727352096}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E062203C-7759-4B2F-8EE7-DF725EED1DB7}\TypeLib\ = "{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B038F224-F9F5-4B83-A0D0-43D68D8E3CFE}\TypeLib\ = "{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\ajki.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E062203C-7759-4B2F-8EE7-DF725EED1DB7}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ucjs0l.Bho\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D83E84DA-D187-4300-B5D7-727727352096}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D83E84DA-D187-4300-B5D7-727727352096}\Programmable regsvr32.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3108 PING.EXE -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3040 msedge.exe 3040 msedge.exe 1300 msedge.exe 1300 msedge.exe 3952 identity_helper.exe 3952 identity_helper.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4780 wrote to memory of 4640 4780 216eed107f28c9b994c12ce02cff2c03_JaffaCakes118.exe 83 PID 4780 wrote to memory of 4640 4780 216eed107f28c9b994c12ce02cff2c03_JaffaCakes118.exe 83 PID 4780 wrote to memory of 4640 4780 216eed107f28c9b994c12ce02cff2c03_JaffaCakes118.exe 83 PID 4780 wrote to memory of 1300 4780 216eed107f28c9b994c12ce02cff2c03_JaffaCakes118.exe 84 PID 4780 wrote to memory of 1300 4780 216eed107f28c9b994c12ce02cff2c03_JaffaCakes118.exe 84 PID 1300 wrote to memory of 1664 1300 msedge.exe 85 PID 1300 wrote to memory of 1664 1300 msedge.exe 85 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 1332 1300 msedge.exe 86 PID 1300 wrote to memory of 3040 1300 msedge.exe 87 PID 1300 wrote to memory of 3040 1300 msedge.exe 87 PID 1300 wrote to memory of 3380 1300 msedge.exe 88 PID 1300 wrote to memory of 3380 1300 msedge.exe 88 PID 1300 wrote to memory of 3380 1300 msedge.exe 88 PID 1300 wrote to memory of 3380 1300 msedge.exe 88 PID 1300 wrote to memory of 3380 1300 msedge.exe 88 PID 1300 wrote to memory of 3380 1300 msedge.exe 88 PID 1300 wrote to memory of 3380 1300 msedge.exe 88 PID 1300 wrote to memory of 3380 1300 msedge.exe 88 PID 1300 wrote to memory of 3380 1300 msedge.exe 88 PID 1300 wrote to memory of 3380 1300 msedge.exe 88 PID 1300 wrote to memory of 3380 1300 msedge.exe 88 PID 1300 wrote to memory of 3380 1300 msedge.exe 88 PID 1300 wrote to memory of 3380 1300 msedge.exe 88 PID 1300 wrote to memory of 3380 1300 msedge.exe 88 PID 1300 wrote to memory of 3380 1300 msedge.exe 88 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2932 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\216eed107f28c9b994c12ce02cff2c03_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\216eed107f28c9b994c12ce02cff2c03_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Windows\system32\ajki.dll"2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://thevid11.com/bind2.php?id=1xxx39129412⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff824c446f8,0x7ff824c44708,0x7ff824c447183⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,18062253701823629829,6924245386807738562,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:23⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,18062253701823629829,6924245386807738562,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,18062253701823629829,6924245386807738562,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:83⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18062253701823629829,6924245386807738562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:13⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18062253701823629829,6924245386807738562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:13⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18062253701823629829,6924245386807738562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3984 /prefetch:13⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18062253701823629829,6924245386807738562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3632 /prefetch:13⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,18062253701823629829,6924245386807738562,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:83⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,18062253701823629829,6924245386807738562,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18062253701823629829,6924245386807738562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:13⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18062253701823629829,6924245386807738562,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:13⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18062253701823629829,6924245386807738562,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:13⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18062253701823629829,6924245386807738562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:13⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18062253701823629829,6924245386807738562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2748 /prefetch:13⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18062253701823629829,6924245386807738562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:13⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,18062253701823629829,6924245386807738562,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5192 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1640
-
-
-
C:\Windows\SysWOW64\a.exe"C:\Windows\system32\a.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:4668 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\del.bat" "3⤵PID:4800
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S -H "C:\Windows\SysWOW64\a.exe"4⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:2932
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 14⤵
- Runs ping.exe
PID:3108
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3956
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
6KB
MD5ec0281634e3f46bd4c9cc15d93c90d1c
SHA171790af78de9501ddf9edb8aa9b8bd769a784d71
SHA256da0253fdbed6770b5a4ee354441523a947b2811ffeb0fcdaf5414c74eda36042
SHA512c80b016ae936b199d66de0bcc8f7f2f32179c95cc17a31ee906594304a36a3621ac2a2c2b772b9a97844afb85a327757739bf7c5b67f35a6f9ac5e2312ca1736
-
Filesize
5KB
MD5e360ae5a9f435e9236371b43698be28d
SHA155a3c36397fc5444cfd250a9ccc249515f83cb18
SHA2567baa0d58f5602376a4a778c2a4ace79d9c58c3bb619c2097a47c1725b28e4743
SHA5122599531a367fc562dccd471d56cc8c505fc6b544ef40bc1b3d11043f414827b927ff19d2a6317e0a28cd593787b5863cb2aae89fe1e9376f3ea628f8f99291ca
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51844f16ba2c4698e88e76d11f764318b
SHA1d54b8df6f9ed4d484d34b6d165961b27c9de7eaa
SHA2560be196ff90de4ecdd159c19b432e58c2560038433cc017132a82b942e34c42af
SHA512e256624f1872243761300c801a06f3d2273235166ad26d7b7c1abb58529b744602b598148e4bfbab4b3934351237c725bbbf39af736cbc3795ddab844947540c
-
Filesize
135B
MD546e4e0e0ca92f5244ba4fa1b863f24fc
SHA10c80a83e08dbc31bb03744b34bea5017e63bc052
SHA2563cffd8303b11d87a738391a5c76406fda416ba4e9d4a799a69d7ca4eb94756ce
SHA5123e520fdc86fcb755293dc83113f811dfb1bba3a23615144d5bf805fe716cc8bbdda6390a53de90061c5b9e06e05d5526d976c2f925dc47548071bc4756e65e69
-
Filesize
112KB
MD5d27332c61dff6b277ed57ee066be0f28
SHA146c2a4e9dea734d5add02b5b76305dbbaa8224b8
SHA25637b71727ad33484095b3913de579c5128e25236e2d04b1a343831323be07ccd3
SHA512342e76352b3631e91e697c2a39ab794fd07cfffa1d890b154b8f8384696cb727eb667afcb803801991695dcdd7fadba0b919bb1bc3ff2a0341310c7eaceaf714
-
Filesize
400KB
MD57f961adc5c09b08b668a753a4d21cd12
SHA1f5f37a3767ab79b58de643cffd9949fa2e4d5f98
SHA25626c9b73cec00efd4afebe4a24a4a35dc74a5a1f77be9ef2c17f19fcea0179f23
SHA512f66aae3ad91cdcc8a9c37dbf3c561052fa603aea9200455e4a409bc6531efdfbf41079e5f159f1a503c29bccf5c7a52aec4a902f1fc7210a33dc94d042ccc12c