Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 09:33
Static task
static1
Behavioral task
behavioral1
Sample
e22dff8d1ff7cb47699cedc6932cef77_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e22dff8d1ff7cb47699cedc6932cef77_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e22dff8d1ff7cb47699cedc6932cef77_JaffaCakes118.exe
-
Size
4.0MB
-
MD5
e22dff8d1ff7cb47699cedc6932cef77
-
SHA1
98def2b0961a07a4571de6e3d745cb6c71a26322
-
SHA256
d51b8b693e10d6ce02fdf0c3d581b1c7ade2ea87c249fa8d7f336ff9a6e57ca6
-
SHA512
2fcbf78c9c1004ca3fe67a01eb5c56897a8e10d59ca051c4e95079602894ef3f22d69a68044b1e390ed19dcdd80d4b34a32c806fa2d70bc4008291caed6c3804
-
SSDEEP
98304:aHGg18JXf7PdlB426yyIPjk5C93QsxeBp4/OL+z:aHkhTT9iIt9jxeLL+z
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e22dff8d1ff7cb47699cedc6932cef77_JaffaCakes118.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Wine e22dff8d1ff7cb47699cedc6932cef77_JaffaCakes118.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e22dff8d1ff7cb47699cedc6932cef77_JaffaCakes118.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 e22dff8d1ff7cb47699cedc6932cef77_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\server.exe e22dff8d1ff7cb47699cedc6932cef77_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\server.exe e22dff8d1ff7cb47699cedc6932cef77_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3324 set thread context of 1588 3324 e22dff8d1ff7cb47699cedc6932cef77_JaffaCakes118.exe 141 -
Program crash 25 IoCs
pid pid_target Process procid_target 2864 3324 WerFault.exe 82 1796 3324 WerFault.exe 82 1376 3324 WerFault.exe 82 4072 3324 WerFault.exe 82 4868 3324 WerFault.exe 82 4244 3324 WerFault.exe 82 3964 3324 WerFault.exe 82 1904 3324 WerFault.exe 82 2252 3324 WerFault.exe 82 1644 3324 WerFault.exe 82 2408 3324 WerFault.exe 82 4168 3324 WerFault.exe 82 4900 3324 WerFault.exe 82 4604 3324 WerFault.exe 82 4468 3324 WerFault.exe 82 5072 3324 WerFault.exe 82 2912 3324 WerFault.exe 82 3900 3324 WerFault.exe 82 4232 3324 WerFault.exe 82 1844 3324 WerFault.exe 82 1200 3324 WerFault.exe 82 3456 3324 WerFault.exe 82 3752 3324 WerFault.exe 82 4440 3324 WerFault.exe 82 2212 3324 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e22dff8d1ff7cb47699cedc6932cef77_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2108 msedge.exe 2108 msedge.exe 1588 msedge.exe 1588 msedge.exe 1160 identity_helper.exe 1160 identity_helper.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3324 wrote to memory of 1588 3324 e22dff8d1ff7cb47699cedc6932cef77_JaffaCakes118.exe 141 PID 3324 wrote to memory of 1588 3324 e22dff8d1ff7cb47699cedc6932cef77_JaffaCakes118.exe 141 PID 3324 wrote to memory of 1588 3324 e22dff8d1ff7cb47699cedc6932cef77_JaffaCakes118.exe 141 PID 1588 wrote to memory of 372 1588 msedge.exe 142 PID 1588 wrote to memory of 372 1588 msedge.exe 142 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 4080 1588 msedge.exe 143 PID 1588 wrote to memory of 2108 1588 msedge.exe 144 PID 1588 wrote to memory of 2108 1588 msedge.exe 144 PID 1588 wrote to memory of 2332 1588 msedge.exe 145 PID 1588 wrote to memory of 2332 1588 msedge.exe 145 PID 1588 wrote to memory of 2332 1588 msedge.exe 145 PID 1588 wrote to memory of 2332 1588 msedge.exe 145 PID 1588 wrote to memory of 2332 1588 msedge.exe 145 PID 1588 wrote to memory of 2332 1588 msedge.exe 145 PID 1588 wrote to memory of 2332 1588 msedge.exe 145 PID 1588 wrote to memory of 2332 1588 msedge.exe 145 PID 1588 wrote to memory of 2332 1588 msedge.exe 145 PID 1588 wrote to memory of 2332 1588 msedge.exe 145 PID 1588 wrote to memory of 2332 1588 msedge.exe 145 PID 1588 wrote to memory of 2332 1588 msedge.exe 145 PID 1588 wrote to memory of 2332 1588 msedge.exe 145 PID 1588 wrote to memory of 2332 1588 msedge.exe 145 PID 1588 wrote to memory of 2332 1588 msedge.exe 145 PID 1588 wrote to memory of 2332 1588 msedge.exe 145 PID 1588 wrote to memory of 2332 1588 msedge.exe 145
Processes
-
C:\Users\Admin\AppData\Local\Temp\e22dff8d1ff7cb47699cedc6932cef77_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e22dff8d1ff7cb47699cedc6932cef77_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 2802⤵
- Program crash
PID:2864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 4122⤵
- Program crash
PID:1796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 4202⤵
- Program crash
PID:1376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 5042⤵
- Program crash
PID:4072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 5402⤵
- Program crash
PID:4868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 5602⤵
- Program crash
PID:4244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 5762⤵
- Program crash
PID:3964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 5642⤵
- Program crash
PID:1904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 5442⤵
- Program crash
PID:2252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 5002⤵
- Program crash
PID:1644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 4842⤵
- Program crash
PID:2408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 5042⤵
- Program crash
PID:4168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 5682⤵
- Program crash
PID:4900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 5642⤵
- Program crash
PID:4604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 5202⤵
- Program crash
PID:4468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 4082⤵
- Program crash
PID:5072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 5442⤵
- Program crash
PID:2912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 4202⤵
- Program crash
PID:3900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 5482⤵
- Program crash
PID:4232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 5242⤵
- Program crash
PID:1844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 4962⤵
- Program crash
PID:1200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 4802⤵
- Program crash
PID:3456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 5122⤵
- Program crash
PID:3752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 5082⤵
- Program crash
PID:4440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 5642⤵
- Program crash
PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeC:\Windows\system32\server.exe2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9d44e46f8,0x7ff9d44e4708,0x7ff9d44e47183⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,127602607187553406,5824548743656629601,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:23⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,127602607187553406,5824548743656629601,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,127602607187553406,5824548743656629601,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3004 /prefetch:83⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,127602607187553406,5824548743656629601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3000 /prefetch:13⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,127602607187553406,5824548743656629601,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:13⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,127602607187553406,5824548743656629601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:13⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,127602607187553406,5824548743656629601,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4268 /prefetch:13⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,127602607187553406,5824548743656629601,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3644 /prefetch:83⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,127602607187553406,5824548743656629601,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3644 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,127602607187553406,5824548743656629601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3660 /prefetch:13⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,127602607187553406,5824548743656629601,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3620 /prefetch:13⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,127602607187553406,5824548743656629601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:13⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,127602607187553406,5824548743656629601,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4592
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3324 -ip 33241⤵PID:3328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3324 -ip 33241⤵PID:1412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3324 -ip 33241⤵PID:1740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3324 -ip 33241⤵PID:2776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3324 -ip 33241⤵PID:2556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3324 -ip 33241⤵PID:4552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3324 -ip 33241⤵PID:216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3324 -ip 33241⤵PID:1636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3324 -ip 33241⤵PID:1404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3324 -ip 33241⤵PID:2980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3324 -ip 33241⤵PID:3252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3324 -ip 33241⤵PID:4592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3324 -ip 33241⤵PID:4132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3324 -ip 33241⤵PID:2156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3324 -ip 33241⤵PID:3376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3324 -ip 33241⤵PID:2304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3324 -ip 33241⤵PID:3272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3324 -ip 33241⤵PID:1828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3324 -ip 33241⤵PID:2976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3324 -ip 33241⤵PID:1148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3324 -ip 33241⤵PID:3560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3324 -ip 33241⤵PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3324 -ip 33241⤵PID:4788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3324 -ip 33241⤵PID:3504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3324 -ip 33241⤵PID:4544
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2244
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\49a2432c-9811-4698-b7f9-b7d8200963da.tmp
Filesize5KB
MD5b5f2dd4281d00fa944fe7f25ca2b3d6b
SHA1672cf3da42528f58c2f311a872b5f08062622454
SHA25621b210afca52c36eeda8a74cd83f60bbf7b2d30f2839cb0c79b2e73f11d3e260
SHA51273158ff064bf05e62d68da975ffcf5f51162af05853a4cea3570022b262502a641a8aad3544a95f7b90f2da7e2bc85bde5194ba47a226cd3e89da54f7edaa4db
-
Filesize
6KB
MD591d347434048023bc2ef13c3758703a0
SHA1e76d66c27f527711d03a12cc3c7f9c8f35f7bc99
SHA25600728b280d018fef39f3cd97dc6073b310a90bf6241c1cff887f5ac1bc817b98
SHA512149ee4721051b909123d00ca20fe65ed85a62e3fdc1a1cea1553aa4fb64b3f2f49923034ca716af287b69c71f6ac5512f0af826b29dffcf535084ad365de547d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD598a73a3501e0264d442de21978842ef5
SHA113bf6409946c490c2c60a6fa5f46d27d50314b8e
SHA25668589abc35970aa6caa0a84566dedeed5cab04babcd0eecb8518273f68a66b5f
SHA5122cd671b87e914991002c5e91323391c307d1e02150cdc6faf529bf3921020c1a8506d1502ef955cd36dd62bd25fb038de542ef85d6b2b29d2259f8e2333df822