Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 18:54
Static task
static1
Behavioral task
behavioral1
Sample
c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe
-
Size
170KB
-
MD5
c96c5d01900e41f234506c0330324d0a
-
SHA1
ca69875bc59bb23831103ad05fa78492c792c65c
-
SHA256
09a73cb7d6bc345320c9d233ecf7deb6e686faa6aa39f91d9819082c0d5f9271
-
SHA512
efffec9ab42324c9b46053b99f97b0aa759cfa03ed86d53d029e2d3db5799df1e9c0a0bb60cb0c90bb74938ad18bd83ebd19d1add73d381f32de20860f403d5c
-
SSDEEP
3072:qwxdYCB5HKaqTCCXnH7HAxP8jeWpVe6w9H5SqTwv0FUXBLlW0rSytR:1dYCBpKpGgnHz5KWTlwVcvMUXBLRnt
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wmplayer = "C:\\MessengerPlus\\mplayer2.exe" c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1236 4264 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "00000001" c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Download c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 3136 msedge.exe 3136 msedge.exe 2760 msedge.exe 2760 msedge.exe 1428 identity_helper.exe 1428 identity_helper.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4012 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4012 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4264 wrote to memory of 2760 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 97 PID 4264 wrote to memory of 2760 4264 c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe 97 PID 2760 wrote to memory of 2004 2760 msedge.exe 98 PID 2760 wrote to memory of 2004 2760 msedge.exe 98 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 896 2760 msedge.exe 99 PID 2760 wrote to memory of 3136 2760 msedge.exe 100 PID 2760 wrote to memory of 3136 2760 msedge.exe 100 PID 2760 wrote to memory of 3304 2760 msedge.exe 101 PID 2760 wrote to memory of 3304 2760 msedge.exe 101 PID 2760 wrote to memory of 3304 2760 msedge.exe 101 PID 2760 wrote to memory of 3304 2760 msedge.exe 101 PID 2760 wrote to memory of 3304 2760 msedge.exe 101 PID 2760 wrote to memory of 3304 2760 msedge.exe 101 PID 2760 wrote to memory of 3304 2760 msedge.exe 101 PID 2760 wrote to memory of 3304 2760 msedge.exe 101 PID 2760 wrote to memory of 3304 2760 msedge.exe 101 PID 2760 wrote to memory of 3304 2760 msedge.exe 101 PID 2760 wrote to memory of 3304 2760 msedge.exe 101 PID 2760 wrote to memory of 3304 2760 msedge.exe 101 PID 2760 wrote to memory of 3304 2760 msedge.exe 101 PID 2760 wrote to memory of 3304 2760 msedge.exe 101 PID 2760 wrote to memory of 3304 2760 msedge.exe 101 PID 2760 wrote to memory of 3304 2760 msedge.exe 101 PID 2760 wrote to memory of 3304 2760 msedge.exe 101 PID 2760 wrote to memory of 3304 2760 msedge.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c96c5d01900e41f234506c0330324d0a_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 3882⤵
- Program crash
PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.youtube.com/watch?v=FvCdqOQZQuk2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff3fb46f8,0x7ffff3fb4708,0x7ffff3fb47183⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,9976606170378818082,11135435436171657685,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:23⤵PID:896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,9976606170378818082,11135435436171657685,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,9976606170378818082,11135435436171657685,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:83⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9976606170378818082,11135435436171657685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:13⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9976606170378818082,11135435436171657685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:13⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9976606170378818082,11135435436171657685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:13⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9976606170378818082,11135435436171657685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3736 /prefetch:13⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2160,9976606170378818082,11135435436171657685,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4092 /prefetch:83⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,9976606170378818082,11135435436171657685,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:83⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,9976606170378818082,11135435436171657685,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9976606170378818082,11135435436171657685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:13⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9976606170378818082,11135435436171657685,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:13⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9976606170378818082,11135435436171657685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:13⤵PID:5220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9976606170378818082,11135435436171657685,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:13⤵PID:5228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,9976606170378818082,11135435436171657685,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5716 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2408
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4264 -ip 42641⤵PID:2028
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2128
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3628
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x510 0x4d81⤵
- Suspicious use of AdjustPrivilegeToken
PID:4012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD5ba40db0cdc3dd8dc249daed56659bdd1
SHA1e1033a73a7c398bba49b3616b93724bc461e0f37
SHA256075c926e848fb378e7660848d31ba56b06721b9d63b092d273d48818c44c079d
SHA512801d0c070bf79fa6e37d2f16785ee68b46482a13231299ec9e9e00dfe279a50394ce7f2f7d452a1febf800bef48fd8a00986bc092c661613a849281a822cd5fa
-
Filesize
2KB
MD5f8512904615c136c29cd88993f02a695
SHA15931761032fe292113ab24e0aa21ef20bba83a8a
SHA256657159cacfe5013d842d05e5383d878bb14b4cd9f22038f6497b2b21e059f06b
SHA512b46a5fd433f4ef9fdd7620ae1f80f66feea2717f95a2f5141bb3c9b30578d753f8fc9adadd22d82ca6e2eec115d189d069ffd6d81ecd3317614409f7775328d0
-
Filesize
2KB
MD5d2ceb2c199a770436d6deff4d2791b47
SHA1f72e6938d9f0de2eda2254401549eb1f6e3973ae
SHA2563311e7ae7dd161a38a9facb4c64750e03057562c326fecae4ecf2f792d2bf6ef
SHA51225b9791a10a5f4ea2b7019732d353fb749aaa7a8c3be72604e159f18358246b65b1395b406f7a17062ea6ef039c6e731e95f260fa1ca08165687e2c60700dbb8
-
Filesize
5KB
MD5a970336fe0bdf4b2ee2d6d7641fc367c
SHA1f9a1c0312da986dcb5db5f71284a928f650f66cd
SHA2562356bb4165adab02a4b18c3db907e0436c280c4a5aac3dc463d625f3e0a35482
SHA5129a9ae26ba002f3e7b0941f5adbc3351c5d6a7e94866b127215fbf02b227d8b0f8b2a344d187ed475defa35c2347fc59f74fe92c306e576dd3be1cd3bfd377ffc
-
Filesize
6KB
MD5011c830469386b3626719141af1d4db9
SHA17fc3daa75888a989ad87b34d7dac6b077aa886db
SHA256fef7081bc0344fe748fac77e8ade8445c128e2428513fdbd4ca848162b1d5afc
SHA512a1936792900ba2f30ebd81d7b07d93656b22574f763a71689073d1e2c510d9f22973d3bfa85912a8f1c88d7237ed8e04c423d03aa9e6d48824878411d6cf5b84
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\d2d1907d-5e9f-4571-8d0b-86a1a282c6a9\index-dir\the-real-index
Filesize2KB
MD5506ecabda30a10eee0e31837ea77fb4d
SHA1d9ac2fa50af0d16cae2b86f4058717f220fa6470
SHA256485f6949af6a1e05a651a5a5ee1d6240055770a90afeb588b2041a55d5868143
SHA512fe2287e7456e3b264245f108dbfe0eb2b3dfc5d61f2d1bceb0e596ae368ed873bcf536a529b60dd87815c2054fd0f7c92d5e7bba748c64b66a29ceac922500ff
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\d2d1907d-5e9f-4571-8d0b-86a1a282c6a9\index-dir\the-real-index~RFe580318.TMP
Filesize48B
MD5a2d9ea37ad3a6c90a720b4eff9821c4e
SHA185df3c258e2c7eedb8a662ec56728d27f37826ce
SHA2566d4e6fa34d9ae83402a5a6489e2a9c69a3a3e14b4e77aa4b860c968516cd4dc3
SHA51232db0df2f1e1f836c2701bb15e40758416cdafd007691a903eea2deb8be9aa481c4f3518c469e30f9af9df343d5c588744286d8dd758ee4c64dfe36569a2d055
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize89B
MD5a4932445263e830a8f716e74b6e313df
SHA1d1e4283cf834f99ba6bef822c69922195c1cc3d0
SHA2566eadff9c12c7d7459f195fa3be3b85d97aca2d7bf5ea98352fc391b9c6ce1fdf
SHA512e8fa2d9f284aeff1a01d80a6d3400f89c0f07e7be162355253b819a4bf8ee8055a1072c2efc080d78c15125f1c0e69593e33b6b366a466f46fc5080965279adf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize146B
MD57d5cfe69a15f7b30a73610f5e3d41d4e
SHA129b3763e05697b43c2160668851d3b7a3ac97e18
SHA2560c90e09369ef3c807fab7b014f05d0c8566d7e14ce07697962ee8fa907583548
SHA51203c432c438605a143dd5612e4cfdd6b4d1ec3efa5568bb64858285d64b5dc4d1e2342399e4b1f0e7b6bd440f41127d192db4fcbe89ff30d1395ff6d50ba003c7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize84B
MD5b8b18192031a90ef2ae3310a175fdac1
SHA14778345e0b17b2660923de8e1da7736fbb47dcda
SHA25686e4ff6e49bcd0a5a0ab6e28f041b48e4d5ae1e6172b568b0d97c1b20bd108f8
SHA512c44c1187a0202ec6b9fcf267636eb8acd49372da284582a8cfbbe6ff9ff24d1c256b0ab9fdd4736be9a1201cffaa2b33e9e53c957cb7cca1de183c5d79104f48
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize82B
MD5474af7448ce64e687500ad6771f82e55
SHA18641265872a3aed15c5cfd12328cd42ef7cc3033
SHA256364fc0947d5de1879626eb3f0487e19864f4c517037de09c6ecfb3db3f06195b
SHA5126c79f792da840c6401fca98a3a025cb8fb64a146ded235085a439261c88bd287fed5ca2c1829adcad2262760458222dcfcaca661e76d248c3aa64dd7ce431795
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD55a9f93317f5ca05b8953ba9a88181daa
SHA178ed09c41261c9e5921b3c0e3e498923c3a8997e
SHA25615bef1ae09b873eb6ccfa358a7dc332cd712c9b8a3ea006985368a889a08b104
SHA5121efa7d59ad92a0d2dee6d8c83170777c41d16d3158d47e51fd25e29b31fdbc0487bc3256f411d1bd7463ad9c03ebab86e5484496d917388936bc67558d96b7cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57fd1d.TMP
Filesize48B
MD5c0a0ecfd3afdcb4c64b780f18ae39a68
SHA1e9a0e08b2b5df356be6f1368ef077d7c89574b4e
SHA256534afe1bde99f16794ffd278533ecd2ccbeaade53a20c3ba87df0127697a7134
SHA512214ff2d5db489de4d0606343734c4fedb57cd812baea5efa7d790c21f3a8352fbe3ee8f53a545941bda8b0be6c6c8605c1793359e68f76062321808b9c1d05ab
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD542e821238f93e6b3cdf9d59d9bd8231a
SHA1f6583a5acc4556ae0147d41e49f6fe9ae5b26563
SHA256b60a6c7a4de8f627d3bc02c772e6b8761bf18fa702a0cda2367e7c24e1864b0c
SHA51213daccb6fb347a07e606d434bf22927a4a85d6266644b1ee2933e79736b4275959cf303a4376b9e36da005ed9cb29e0d6cb7f91581ca08ced1d0faab97046a93