Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 07:04
Static task
static1
Behavioral task
behavioral1
Sample
cef3cbb01fb04c389cddafeccb7c0158_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cef3cbb01fb04c389cddafeccb7c0158_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cef3cbb01fb04c389cddafeccb7c0158_JaffaCakes118.exe
-
Size
137KB
-
MD5
cef3cbb01fb04c389cddafeccb7c0158
-
SHA1
57f6544dae29a3a96b95014509e0534a2ece2dca
-
SHA256
dbea5e842b67c3e0f57330d44867d56bca910ed7382185cfcb325df20124fc8b
-
SHA512
37d318df342a99804f661c76bb354f3979cc9dc123a4417f089376ba21b3addd84968be8f224dc6254f92c0fd7c1ec5c3091ca10325ca92899c9bf8ffa9feca2
-
SSDEEP
3072:rrXoMFXFfiVdubWibOQNi3MWL4FksNYFfPK:rLosfwAbpi3MDEK
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" plugin.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" watcher.exe -
Executes dropped EXE 2 IoCs
pid Process 3840 plugin.exe 3764 watcher.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Module = "%ALLUSERSPROFILE%\\Media\\plugin.exe" cef3cbb01fb04c389cddafeccb7c0158_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" plugin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA plugin.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" watcher.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA watcher.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 2 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\ProgramData\Media\plugin.exe:Zone.Identifier cmd.exe File created C:\ProgramData\Media\watcher.exe:Zone.Identifier cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cef3cbb01fb04c389cddafeccb7c0158_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plugin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language watcher.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\ProgramData\Media\plugin.exe:Zone.Identifier cmd.exe File created C:\ProgramData\Media\watcher.exe:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3840 plugin.exe 3840 plugin.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe 3764 watcher.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3840 plugin.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4468 wrote to memory of 4712 4468 cef3cbb01fb04c389cddafeccb7c0158_JaffaCakes118.exe 83 PID 4468 wrote to memory of 4712 4468 cef3cbb01fb04c389cddafeccb7c0158_JaffaCakes118.exe 83 PID 4468 wrote to memory of 4712 4468 cef3cbb01fb04c389cddafeccb7c0158_JaffaCakes118.exe 83 PID 4468 wrote to memory of 3488 4468 cef3cbb01fb04c389cddafeccb7c0158_JaffaCakes118.exe 84 PID 4468 wrote to memory of 3488 4468 cef3cbb01fb04c389cddafeccb7c0158_JaffaCakes118.exe 84 PID 4468 wrote to memory of 3488 4468 cef3cbb01fb04c389cddafeccb7c0158_JaffaCakes118.exe 84 PID 4468 wrote to memory of 3840 4468 cef3cbb01fb04c389cddafeccb7c0158_JaffaCakes118.exe 87 PID 4468 wrote to memory of 3840 4468 cef3cbb01fb04c389cddafeccb7c0158_JaffaCakes118.exe 87 PID 4468 wrote to memory of 3840 4468 cef3cbb01fb04c389cddafeccb7c0158_JaffaCakes118.exe 87 PID 3840 wrote to memory of 3764 3840 plugin.exe 88 PID 3840 wrote to memory of 3764 3840 plugin.exe 88 PID 3840 wrote to memory of 3764 3840 plugin.exe 88 PID 4712 wrote to memory of 1416 4712 cmd.exe 89 PID 4712 wrote to memory of 1416 4712 cmd.exe 89 PID 1416 wrote to memory of 1432 1416 msedge.exe 91 PID 1416 wrote to memory of 1432 1416 msedge.exe 91 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 3408 1416 msedge.exe 92 PID 1416 wrote to memory of 5100 1416 msedge.exe 93 PID 1416 wrote to memory of 5100 1416 msedge.exe 93 PID 1416 wrote to memory of 3080 1416 msedge.exe 94 PID 1416 wrote to memory of 3080 1416 msedge.exe 94 PID 1416 wrote to memory of 3080 1416 msedge.exe 94 PID 1416 wrote to memory of 3080 1416 msedge.exe 94 PID 1416 wrote to memory of 3080 1416 msedge.exe 94 PID 1416 wrote to memory of 3080 1416 msedge.exe 94 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System plugin.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" plugin.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System watcher.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" watcher.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cef3cbb01fb04c389cddafeccb7c0158_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cef3cbb01fb04c389cddafeccb7c0158_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\cmd.exe/c start http://youporn.ru2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://youporn.ru/3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa4af446f8,0x7ffa4af44708,0x7ffa4af447184⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,16372262396367182668,5577543595408587102,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:24⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2252,16372262396367182668,5577543595408587102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:34⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2252,16372262396367182668,5577543595408587102,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:84⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,16372262396367182668,5577543595408587102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:14⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,16372262396367182668,5577543595408587102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:14⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,16372262396367182668,5577543595408587102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:14⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,16372262396367182668,5577543595408587102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:14⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,16372262396367182668,5577543595408587102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:14⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,16372262396367182668,5577543595408587102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3632 /prefetch:14⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,16372262396367182668,5577543595408587102,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3596 /prefetch:14⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2252,16372262396367182668,5577543595408587102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 /prefetch:84⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2252,16372262396367182668,5577543595408587102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 /prefetch:84⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,16372262396367182668,5577543595408587102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:14⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,16372262396367182668,5577543595408587102,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:14⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,16372262396367182668,5577543595408587102,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5216 /prefetch:24⤵PID:1448
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\Media\rdb.bat2⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:3488
-
-
C:\ProgramData\Media\plugin.exe-wait2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3840 -
C:\ProgramData\Media\watcher.exeC:\ProgramData\Media\watcher.exe3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:3764
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3816
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2084
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137KB
MD5cef3cbb01fb04c389cddafeccb7c0158
SHA157f6544dae29a3a96b95014509e0534a2ece2dca
SHA256dbea5e842b67c3e0f57330d44867d56bca910ed7382185cfcb325df20124fc8b
SHA51237d318df342a99804f661c76bb354f3979cc9dc123a4417f089376ba21b3addd84968be8f224dc6254f92c0fd7c1ec5c3091ca10325ca92899c9bf8ffa9feca2
-
Filesize
13B
MD538de427224a5082a04fe82e2bd4ea9ec
SHA17e4a53de1f83762dd2febd39b818e2258bc83bc1
SHA25612f99f53144294750fe8713d580eda286f4bd95cd9c840db8ab957def8040028
SHA512ec3f3c324eeaad91ab0efd47b3084493d863f969344fa1ba87ace1974908053d396673b44c33b4dceeef792a74ad9278e06acc27c83459af1153de52f83afcbf
-
Filesize
97B
MD55303b5018a6cd19200b98d31ab04f25d
SHA18285eb92f131111e40d2dc864d3b386dad6b9129
SHA256464648d492af6bb50cf65ddcbdca3e90d4b224ccc6f4ce3944d439b6c32da524
SHA512654aed00850f6b7e424a5ec5acad086a51fb54f5f944238979f43fa1aac430661250210fe5f38dcd78e46311adc7e6b282cb5c41bebfe5a7d297afd6db6de21b
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD590ddbcc6ae21f4a1aad0632da854a93c
SHA13283be6b86995ea963e87d2c0ba2905620846b52
SHA2561e8a4598c9fc2a7812586a48bf2e6fa9d289c9652eeedda7059d04c708b42e5c
SHA5129990e1a203987a3a7536f01d05652f19d3034c9b6fa626e104ce2f0df2f5b71b248d4ee4a986a12fc7904d6ec7c0ed6d4a3dfe4def80bb5ceb9c48f5d6a93ce3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD5911997fa5f4f843cbcf99ac726cbc594
SHA13e4f8289e8433701c454fa5dceba5c11973ed1de
SHA2562a179659431b8583ecfb617015f67782a1feba88d009beafe658b823b72d7aee
SHA51253abc0a8e837642ebbac15d8bd8cd482ca052f3f2de57efa4f9f912e795e9604295608d711fc32f16cdc724671bbab5dee525bcf71f1fa969b5c62e9299a7959
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5166ec39ac838dcba1bfe33fd29830132
SHA15a25cc1241bfbb607d24dad39adb22b97a0c6df0
SHA256e3bb8236ab6483dbb34819527bf13fd6c10386e61f2455a0eb4fc139d2340f6a
SHA512a42579c283809e03bf091558d7e5e8093b265fb96930e102a66e1cbf250abd9f37beb54c4ba75f558832a96d20cfb70634320cf6cdbb0582175ee821bbc4ab97
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD5c4a31b7d07639aa506ab0fcf188b7aa0
SHA1c24d7e6b7190b39628db7a6c6c254beb06658226
SHA256277ab0988fb8731900eadb57104d35d160516f67587811442d0a5e7b9f160fbe
SHA5128faa8488b6bd8c0af373becef73edf132ab0e35219f437e5445ed3ff781dde9b4c318929776613c6e8c99d576898ca138e63127a14384323eb9d649f2e15449a
-
Filesize
5KB
MD55adc9fff2bdf8f44e6b1c1474fbe99e1
SHA1020a21e447cbc6bd64f6d8a4ec979f293402451e
SHA256cc1d8985930a05a8bb15f8962e29e8fcea2549a4eb24adeee23f65a2e5c4974f
SHA5125c462c21c65f2afb2bbd4ddd146b35a25ea01cc98acf43190cb3f0432c36be71a816994dc74303c7e2b45bf356b4eb5a4ff83dff5d58ab5defc2fc0e8f40d01f
-
Filesize
7KB
MD5d93a3e4c31e06c8e0aedc9faccff178e
SHA10fa1d7a0be149c5e6a2f18dbee29d3664db6a0d1
SHA25603fa39cac6d16bdd1c4a4a2c691cc2161a8c480a71666bf9c2cf469e8e4d013a
SHA5129fa9674d3dde04da231f219da4fb598ba6f6b805146e27b86f618fa8b9cbb5cec9854ed8a821c9edb90a0e459ad6c951e030e08e0af7836933fe18b636e90695
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50cc88e87aedbb87920220d953b8e3910
SHA101172a7d03a450741e516c5565f653adce7b0495
SHA256d4d2d82777ccbbfb19f71b83b52a5c1b3af8142b3df3bb0ad66aa3e1c23da897
SHA51250ca01a2d776299de0cb7b77d7aafd5c6ec9dcaa2ee3e298e531b028175d7f88bda381b0911868ac314fd7cd411b8a44852e4e84a439710d78e5e556cc5e1b97
-
Filesize
10KB
MD57f589e70560e554d495329ac0b87857f
SHA1daa0a02459ab9da14c3716d935a80be0de770acf
SHA256d05188da58415ce3fcc7b6cf1f4cda80ca9db999b9d6b2bf30f22123ccfc3afd
SHA512e1ee4b8e311d64f84d694047300ab12141b3d21e56735a08d123834836e5ef29640a471133f8ebca4f6e77e167f638eaf650419b0f4fa2b815827238a4ddaf52