Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 22:24
Behavioral task
behavioral1
Sample
323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe
-
Size
14KB
-
MD5
323739740a94958f20bf0d61250ccf0f
-
SHA1
4fa5fa46cfa27eff6f756942daee8093279f7930
-
SHA256
ca629852a24db2e13fd102640235f0bc29d68c59cd8c4775c60c73de273b00c9
-
SHA512
5e43863d43b5b007fb2a2302724d336acc1e89c6387009923f8206689b96bae326a5b9aff33865e133dc23b8b31b6ce623ac3e0dbb744db9282e2def29748ce2
-
SSDEEP
384:AdyuFzXa+nLT3s10SOx/LFJXRhrILZGsnK55QPGHoin:AdJlXLT8mSU/BxRhULNO869n
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 8 sDuxi4q.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1976-0-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral2/files/0x00070000000234fa-142.dat upx behavioral2/memory/8-143-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/8-191-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1976-218-0x0000000000400000-0x000000000040D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UpdateService = "C:\\Windows\\system32\\wservice.exe" 323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\UpdateService = "C:\\Windows\\system32\\wservice.exe" 323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\u: 323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe File opened (read-only) \??\r: 323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe File opened (read-only) \??\m: 323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe File opened (read-only) \??\i: 323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe File opened (read-only) \??\h: 323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe File opened (read-only) \??\g: 323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe File opened (read-only) \??\z: 323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe File opened (read-only) \??\w: 323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe File opened (read-only) \??\s: 323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe File opened (read-only) \??\o: 323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe File opened (read-only) \??\l: 323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe File opened (read-only) \??\e: 323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe File opened (read-only) \??\y: 323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe File opened (read-only) \??\x: 323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe File opened (read-only) \??\t: 323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe File opened (read-only) \??\q: 323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe File opened (read-only) \??\p: 323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe File opened (read-only) \??\j: 323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe File opened (read-only) \??\v: 323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe File opened (read-only) \??\n: 323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe File opened (read-only) \??\k: 323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\wservice.exe 323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wservice.exe 323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Children msedge.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage msedge.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe msedge.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe\Children msedge.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949 msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\DisplayName = "Chrome Sandbox" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Moniker = "cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe" msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1480 msedge.exe 1480 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 3628 msedge.exe 1660 identity_helper.exe 1660 identity_helper.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1976 wrote to memory of 4864 1976 323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe 84 PID 1976 wrote to memory of 4864 1976 323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe 84 PID 4864 wrote to memory of 2512 4864 msedge.exe 85 PID 4864 wrote to memory of 2512 4864 msedge.exe 85 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 4056 4864 msedge.exe 86 PID 4864 wrote to memory of 1480 4864 msedge.exe 87 PID 4864 wrote to memory of 1480 4864 msedge.exe 87 PID 4864 wrote to memory of 1784 4864 msedge.exe 88 PID 4864 wrote to memory of 1784 4864 msedge.exe 88 PID 4864 wrote to memory of 1784 4864 msedge.exe 88 PID 4864 wrote to memory of 1784 4864 msedge.exe 88 PID 4864 wrote to memory of 1784 4864 msedge.exe 88 PID 4864 wrote to memory of 1784 4864 msedge.exe 88 PID 4864 wrote to memory of 1784 4864 msedge.exe 88 PID 4864 wrote to memory of 1784 4864 msedge.exe 88 PID 4864 wrote to memory of 1784 4864 msedge.exe 88 PID 4864 wrote to memory of 1784 4864 msedge.exe 88 PID 4864 wrote to memory of 1784 4864 msedge.exe 88 PID 4864 wrote to memory of 1784 4864 msedge.exe 88 PID 4864 wrote to memory of 1784 4864 msedge.exe 88 PID 4864 wrote to memory of 1784 4864 msedge.exe 88 PID 4864 wrote to memory of 1784 4864 msedge.exe 88 PID 4864 wrote to memory of 1784 4864 msedge.exe 88 PID 4864 wrote to memory of 1784 4864 msedge.exe 88 PID 4864 wrote to memory of 1784 4864 msedge.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\323739740a94958f20bf0d61250ccf0f_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.cnn.com/2⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9bbaf46f8,0x7ff9bbaf4708,0x7ff9bbaf47183⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,3281902182972130588,3175523854826521878,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:23⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,3281902182972130588,3175523854826521878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,3281902182972130588,3175523854826521878,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:83⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,3281902182972130588,3175523854826521878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:13⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,3281902182972130588,3175523854826521878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:13⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,3281902182972130588,3175523854826521878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:13⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2176,3281902182972130588,3175523854826521878,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5512 /prefetch:83⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=media.mojom.MediaFoundationService --field-trial-handle=2176,3281902182972130588,3175523854826521878,131072 --lang=en-US --service-sandbox-type=mf_cdm --mojo-platform-channel-handle=5756 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,3281902182972130588,3175523854826521878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:13⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,3281902182972130588,3175523854826521878,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:13⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,3281902182972130588,3175523854826521878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6212 /prefetch:83⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,3281902182972130588,3175523854826521878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6212 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,3281902182972130588,3175523854826521878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6256 /prefetch:13⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,3281902182972130588,3175523854826521878,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6284 /prefetch:13⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,3281902182972130588,3175523854826521878,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5116 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2628
-
-
-
C:\Users\Admin\AppData\Local\Temp\sDuxi4q.exesDuxi4q.exe2⤵
- Executes dropped EXE
PID:8
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1488
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3844
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4a0 0x3041⤵PID:4932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_39B106F123768E115B76BB43FD900961
Filesize1KB
MD5de0763ff0c8cd7e25cb07fad8585c7c4
SHA143eee5bee30115e737d3fbdfdc9585708ee8ddbe
SHA2563361dabcfb4c1e411cf622816f92ea0bdac46556e4bfa9ed9e5afc002500f867
SHA51224a08b4c647532c928abc66476989e7a6387454eee0d0169634b86b3d072033f1086db1317074b9ed13f4e60dd7d5ef2e0c30d7c24b50b86d33c507e382903ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_39B106F123768E115B76BB43FD900961
Filesize514B
MD5996c0d8da4979f71546bf753356db40b
SHA1f278f5a8accb2beebc8eda1456495e24a92400d4
SHA256424cc7fd86e34ac330a03ad61edcea8c5e341797d36994ebf47e615725f31c01
SHA512d4b75a586645a31f7bd42b65d8026bacfabee88009ed2961872c068cb051e12bf64ee3e632b9195095bba6c40f64b6f7f97912a9e6959a2e249c5f97880ac4ab
-
Filesize
152B
MD51f9d180c0bcf71b48e7bc8302f85c28f
SHA1ade94a8e51c446383dc0a45edf5aad5fa20edf3c
SHA256a17d56c41d524453a78e3f06e0d0b0081e79d090a4b75d0b693ddbc39f6f7fdc
SHA512282863df0e51288049587886ed37ad1cf5b6bfeed86454ea3b9f2bb7f0a1c591f3540c62712ebfcd6f1095e1977446dd5b13b904bb52b6d5c910a1efc208c785
-
Filesize
152B
MD560ead4145eb78b972baf6c6270ae6d72
SHA1e71f4507bea5b518d9ee9fb2d523c5a11adea842
SHA256b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7
SHA5128cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize792B
MD5b532d6b84bc3b6acd7a5007f31e3acd5
SHA101a25c9b1f00b1157f4e832fbdf94c97bdc85982
SHA2568dc21fb1a654f041bfe6ebe12bf5595408d162f8f7f9322e8834a36909c0913d
SHA512a2dd2b9bc9669b496b74f1422735b62f19d171476d1d18495829906ec4e0de40965a72d150f9d801d24658f2f689dbf95950b302640e6a702d336707fe66f753
-
Filesize
3KB
MD5fc6dbddfddf0841bcaf79f8e1bc16692
SHA1e7120fe1d37382cdfd0fd2aafb63905d165952b6
SHA2565b209c97bdc2952e8467d1d20b80031e764c1e2bfa56e4cb9229ace7bb5c72f4
SHA5123c57eac31d67d207f1275f848cd19f4c571ecbddf5a095e0655a2ecb855c0778340c09bbf89edfcec9e3b0dc005e9b3680433ef8d5b39ee58b6966c38600b4d9
-
Filesize
3KB
MD57f7341054e7ec3f7277559a8fe1ad866
SHA10a7bd1821134380e8fcfbe2c27da3b85a2bcdddf
SHA256a59eba58fbe683930ac4f45700b74a9013d81c3fe1328c566303f49dcd38f254
SHA512fd4080a0d3bc767675f0ca64274ee1afea3fc4ace20df15b34be5733cc14b8331cdf261b5bf4f85cb59849cf8084d1f817375d4fc3152049c63c68cfb955e29e
-
Filesize
6KB
MD534772c3e3619bed732c3d376a639c06a
SHA191860b556638a8bcd3164237d451cc6023322f01
SHA256c176a23cd702e37cae794551c2cc7c6c11d75da381059902b5bbc0d54a807666
SHA5127f6c0955966be06aa28751bd38f2b6fcf483c2a1f127aecb59abf790f5cd10cc80fb9beaebfeae4d2bc995f524f01d10c36092f51fc5f052c4587ab1721f58ae
-
Filesize
7KB
MD5cd38f597617bbe75d03921b793d0c741
SHA1a2027c415e01c1d0d776bd85cdc82b9a0475a7e9
SHA256129cdd9029e21fa08a49fd6bac43b3c15b3f641de28a023fe58470a4983e56d6
SHA512f0038a4d6a0fc84b64fec5cdfc7cf2be0ad3e079dbdb061646596a38765a2a6450fb8edf64a74f96e37d4e7d80ea0bc4b4059f156f1d4747815bcb6e04887d22
-
Filesize
871B
MD537cefb595329e8ca41483d5e6ed72434
SHA165f94131b7fd926ea57e185504dad405dfd2e3e8
SHA256117b7469e51fb23db4e4de9a8c11ae876c4e56fd920ddeb03c97f9fef14a01e7
SHA5122ee64743f46be11c2d8efd0e141195d9d2ea110d20a203b8e08f4cf3bcd6eaa89211a635f45e5e5bf0b23363514d11d25655fa245afc73002ddf3730c30a3d27
-
Filesize
704B
MD5c2cf92341e68cfa1c88a068f5a214ed3
SHA1d91eab6a510e5ceef28b3e59b95630d6a74f4e57
SHA256c5ad1984f3aaa6d1341adc70ee2169a3ac8b207ba3cc9dd8a2d4eb433b42762f
SHA512001238c33ac4ee776ea89315aa463b628d918ead37c163f1f7ed8ddacb306cc566b7d6508922a96ee94121722a5cf64aff28b734eee48cba62fc27378be59153
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56912fb573ac5da85f5d18d49c9df2d6d
SHA17f87dacaaa8fc16b2d420ab954adaf015d9fae07
SHA25636c7bcbf8d408b94a800a5142c1a9f20579f78f7f91dc999e837b040ba6543b2
SHA51207c59f1085ac4651d0e155e7619b04a49ed828cd3d553bb086ed344e5b9a525a03d046785ac6c5355a4e0040c8b44692232c40d173674129ef449bc845532ed3
-
Filesize
5KB
MD59da57bda8b9aa4990197efddad6b3f10
SHA1c5d88013b330c2e56397c450a14c09e406e273a1
SHA2569b653059ae82c751862f133d97024bb2a5f23bd50f6ad02338aab5fd6bcfc407
SHA5122a8e749cbf0fc1db03b7299f8f10be995f4aed1d54c20e8cd5028a8c2997fa6a9f1f24d188bdc5392b24baf292bfa1ec6f5a0ad25da6e06eb48f0811c6046880