Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 01:44
Static task
static1
Behavioral task
behavioral1
Sample
721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe
-
Size
392KB
-
MD5
721e313563d9fa3414168c5a4725260c
-
SHA1
007a1d4392e0ca186cb5f6bf8e53487e64419a5e
-
SHA256
9a95f50c47ba44bdad1ee0b8206e2deed2b27f393b1a6a823cc564d39347b4a3
-
SHA512
2f26c1e33fdbf90228a7a4f93e2c7434483346272fad7a2225f8a78f6d6e7c80f928bf52db4e8ac16278e41582b82e7bfcaa62cacbe930dab9f20fc5362b9c30
-
SSDEEP
6144:zAUBbv2Q1JbLxgEb3pzFjqai1mlWYR6W7ndw/BOU06o0XmL:cU5jqai1mlxoadwJOJ/0X6
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe:*:Enabled:Java developer Script Browse" 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe = "C:\\Windows\\jusched.exe:*:Enabled:Java developer Script Browse" 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4160 netsh.exe 4896 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 2752 jusched.exe 932 jusched.exe 3604 jusched.exe 2844 jusched.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Java developer Script Browse = "C:\\Windows\\jusched.exe" 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java developer Script Browse = "C:\\Windows\\jusched.exe" 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 jusched.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2668 set thread context of 2832 2668 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 87 PID 2832 set thread context of 3744 2832 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 88 PID 3744 set thread context of 4072 3744 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 89 PID 2752 set thread context of 932 2752 jusched.exe 107 PID 932 set thread context of 3604 932 jusched.exe 108 PID 3604 set thread context of 2844 3604 jusched.exe 109 -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\jusched.exb 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe File opened for modification C:\Windows\jusched.exe 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe File created C:\Windows\jusched.exe 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe File opened for modification C:\Windows\mdll.dl jusched.exe File opened for modification C:\Windows\mtdll.dl jusched.exe File opened for modification C:\Windows\jusched.exe jusched.exe File created C:\Windows\jusched.exb 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1108 sc.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4488 msedge.exe 4488 msedge.exe 2168 msedge.exe 2168 msedge.exe 3656 identity_helper.exe 3656 identity_helper.exe 5760 msedge.exe 5760 msedge.exe 5760 msedge.exe 5760 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2668 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 2832 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 2752 jusched.exe 932 jusched.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2832 2668 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 87 PID 2668 wrote to memory of 2832 2668 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 87 PID 2668 wrote to memory of 2832 2668 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 87 PID 2668 wrote to memory of 2832 2668 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 87 PID 2668 wrote to memory of 2832 2668 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 87 PID 2668 wrote to memory of 2832 2668 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 87 PID 2668 wrote to memory of 2832 2668 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 87 PID 2668 wrote to memory of 2832 2668 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 87 PID 2832 wrote to memory of 3744 2832 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 88 PID 2832 wrote to memory of 3744 2832 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 88 PID 2832 wrote to memory of 3744 2832 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 88 PID 2832 wrote to memory of 3744 2832 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 88 PID 2832 wrote to memory of 3744 2832 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 88 PID 2832 wrote to memory of 3744 2832 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 88 PID 2832 wrote to memory of 3744 2832 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 88 PID 2832 wrote to memory of 3744 2832 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 88 PID 3744 wrote to memory of 4072 3744 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 89 PID 3744 wrote to memory of 4072 3744 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 89 PID 3744 wrote to memory of 4072 3744 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 89 PID 3744 wrote to memory of 4072 3744 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 89 PID 3744 wrote to memory of 4072 3744 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 89 PID 4072 wrote to memory of 4160 4072 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 90 PID 4072 wrote to memory of 4160 4072 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 90 PID 4072 wrote to memory of 4160 4072 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 90 PID 4072 wrote to memory of 2752 4072 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 91 PID 4072 wrote to memory of 2752 4072 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 91 PID 4072 wrote to memory of 2752 4072 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 91 PID 4072 wrote to memory of 5044 4072 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 92 PID 4072 wrote to memory of 5044 4072 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 92 PID 4072 wrote to memory of 5044 4072 721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe 92 PID 4984 wrote to memory of 2168 4984 explorer.exe 94 PID 4984 wrote to memory of 2168 4984 explorer.exe 94 PID 2168 wrote to memory of 1244 2168 msedge.exe 96 PID 2168 wrote to memory of 1244 2168 msedge.exe 96 PID 2168 wrote to memory of 3428 2168 msedge.exe 97 PID 2168 wrote to memory of 3428 2168 msedge.exe 97 PID 2168 wrote to memory of 3428 2168 msedge.exe 97 PID 2168 wrote to memory of 3428 2168 msedge.exe 97 PID 2168 wrote to memory of 3428 2168 msedge.exe 97 PID 2168 wrote to memory of 3428 2168 msedge.exe 97 PID 2168 wrote to memory of 3428 2168 msedge.exe 97 PID 2168 wrote to memory of 3428 2168 msedge.exe 97 PID 2168 wrote to memory of 3428 2168 msedge.exe 97 PID 2168 wrote to memory of 3428 2168 msedge.exe 97 PID 2168 wrote to memory of 3428 2168 msedge.exe 97 PID 2168 wrote to memory of 3428 2168 msedge.exe 97 PID 2168 wrote to memory of 3428 2168 msedge.exe 97 PID 2168 wrote to memory of 3428 2168 msedge.exe 97 PID 2168 wrote to memory of 3428 2168 msedge.exe 97 PID 2168 wrote to memory of 3428 2168 msedge.exe 97 PID 2168 wrote to memory of 3428 2168 msedge.exe 97 PID 2168 wrote to memory of 3428 2168 msedge.exe 97 PID 2168 wrote to memory of 3428 2168 msedge.exe 97 PID 2168 wrote to memory of 3428 2168 msedge.exe 97 PID 2168 wrote to memory of 3428 2168 msedge.exe 97 PID 2168 wrote to memory of 3428 2168 msedge.exe 97 PID 2168 wrote to memory of 3428 2168 msedge.exe 97 PID 2168 wrote to memory of 3428 2168 msedge.exe 97 PID 2168 wrote to memory of 3428 2168 msedge.exe 97 PID 2168 wrote to memory of 3428 2168 msedge.exe 97 PID 2168 wrote to memory of 3428 2168 msedge.exe 97 PID 2168 wrote to memory of 3428 2168 msedge.exe 97 PID 2168 wrote to memory of 3428 2168 msedge.exe 97 PID 2168 wrote to memory of 3428 2168 msedge.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe"2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\721e313563d9fa3414168c5a4725260c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\721e313563d9fa3414168c5a4725260c_JaffaCakes118.exe4⤵
- Modifies firewall policy service
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram 1.exe 1 ENABLE5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4160
-
-
C:\Windows\jusched.exe"C:\Windows\jusched.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2752 -
C:\Windows\jusched.exe"C:\Windows\jusched.exe"6⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:932 -
C:\Windows\jusched.exe"C:\Windows\jusched.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3604 -
C:\Windows\jusched.exeC:\Windows\jusched.exe8⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2844 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram 1.exe 1 ENABLE9⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4896
-
-
C:\Windows\SysWOW64\net.exenet stop wuauserv9⤵
- System Location Discovery: System Language Discovery
PID:1324 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv10⤵
- System Location Discovery: System Language Discovery
PID:4056
-
-
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled9⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1108
-
-
-
-
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe http://browseusers.myspace.com/Browse/Browse.aspx5⤵
- System Location Discovery: System Language Discovery
PID:5044
-
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://browseusers.myspace.com/Browse/Browse.aspx2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff11246f8,0x7ffff1124708,0x7ffff11247183⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,16842025310250675709,2287355637168499963,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:23⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,16842025310250675709,2287355637168499963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2520 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,16842025310250675709,2287355637168499963,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:83⤵PID:896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,16842025310250675709,2287355637168499963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:13⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,16842025310250675709,2287355637168499963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:13⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,16842025310250675709,2287355637168499963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:13⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,16842025310250675709,2287355637168499963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3964 /prefetch:13⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,16842025310250675709,2287355637168499963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:13⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,16842025310250675709,2287355637168499963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:83⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,16842025310250675709,2287355637168499963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,16842025310250675709,2287355637168499963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:13⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,16842025310250675709,2287355637168499963,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:13⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,16842025310250675709,2287355637168499963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:13⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,16842025310250675709,2287355637168499963,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:13⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,16842025310250675709,2287355637168499963,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5760
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3320
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:868
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
2Modify Registry
2Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53ee50fb26a9d3f096c47ff8696c24321
SHA1a8c83e798d2a8b31fec0820560525e80dfa4fe66
SHA256d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f
SHA512479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5a2e21680e38a6c93816222e8a0bbd7ea
SHA1a5a155ad03c86376ad35099fec82661d6d69e5df
SHA2565c9eb96ad479c291c38df475a8037819221796a1a8569875e750444411b52f86
SHA512fb6baa1b8501172abaadd547610e99b55e900f239d8d597c7ec998d2b315cdcf6a6591d3c5ee42b1f0ae4d956c3431bd3d5a34a4a5be84478d87c88260f7fe4d
-
Filesize
1KB
MD532d1d1855908f1405d0b4ea38d0522e4
SHA16c6f0d0999ebfa74914289e5fe17e8150fb17e96
SHA256965472ef91555fbe8e95b21fcf07cf2496ef29947590196782202bef32de2d46
SHA512dcb9c9bf134cc3a0be2c39ad935049ebfc2a601965040e1c30ec1983336147467b9d3a4505caa280fd87799a3731a17a5ad272ff5e5197f4017b29f250d64f4a
-
Filesize
5KB
MD550433a3b9845c36dd34feab1122a0ca9
SHA1bc8cbf973e7e883cc9c1227738be2f90fea075f8
SHA256fe2448b47334cba37968e5f9642e5de9a9d6bf51cf2c3ea9bc12557c43d978af
SHA5122c27590fe669c99876b17690fe737620ff226b5bd91310f3becf0dceb9c50f1b8fb2373e207a723753275d7d70e71d8bea37b5c193414321e8a69f30efee6128
-
Filesize
7KB
MD530e8382bac224b8b05ffe9f607e51fde
SHA13761ab025d6c309d823b7152665c441cd46d22b0
SHA256d91cba70ded666470eb21f39caa452f74ed09f485a4709f390000a51c307a487
SHA512104dc286e71f8fa82d89a889895358ca283469e9b9e363c900e70232360bc6b09d932c0d59e565d3943cc07a3c5e904263cacb582657f3490a0cd8650c63adf3
-
Filesize
7KB
MD5334670faefa6e8b3b20967319351f71f
SHA109e86be3c4f599097ea46c4c741bdf1078aae78d
SHA2566dc8982057e546e540d59525976ec3460979f78cdfe5ff7b61928513d80c2722
SHA51273f97eecdffaac95f0e9d550b890fa0523882241746d082d282c083fec799c768d24752f340ea9c44640a8d8dc37597b92621e6e0ef6574d8318a100ed62abd8
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD55da0bec70644f8fbd0183524ae7beff1
SHA1a8ec2f6ceb6b3d3cc950b3d0d28177b007109f98
SHA256deded77edcfa71ca50c52240926dbacef982e58b41d2802ee73ea5d8cdd1402c
SHA51210c4f31a42f6286151d8d42cdfad728257462a9e71612eec2e4d6691de20be59f19d8f498ed93f342a20676d089e08ab3d16e6206fe5ab64d72020b4bc4a12bc
-
Filesize
392KB
MD5721e313563d9fa3414168c5a4725260c
SHA1007a1d4392e0ca186cb5f6bf8e53487e64419a5e
SHA2569a95f50c47ba44bdad1ee0b8206e2deed2b27f393b1a6a823cc564d39347b4a3
SHA5122f26c1e33fdbf90228a7a4f93e2c7434483346272fad7a2225f8a78f6d6e7c80f928bf52db4e8ac16278e41582b82e7bfcaa62cacbe930dab9f20fc5362b9c30