Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 14:42
Static task
static1
Behavioral task
behavioral1
Sample
e2b9bc2b9df69c9817b2b0247043545c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2b9bc2b9df69c9817b2b0247043545c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e2b9bc2b9df69c9817b2b0247043545c_JaffaCakes118.exe
-
Size
359KB
-
MD5
e2b9bc2b9df69c9817b2b0247043545c
-
SHA1
b9f34acf8cf4326f0519f6025c61f7e00a981521
-
SHA256
5e02f9eb337fa199f0d89267296b27f45836f5e99c97039125f9f0de2971b684
-
SHA512
f5530d4326b2760b175f0a46b2e94afac7797b7306090e95360bd4fc5ec02264b909ea38e2651407b5736b1e16a19adf91afaa151aff5a5476539e6f364d3762
-
SSDEEP
6144:E0bLC5mxx8eYNgOJrIMmFSwL9qhjom0sBe3w:EWuSlYNjrv8SwL9VmTgg
Malware Config
Extracted
C:\Users\Admin\Music\# DECRYPT MY FILES #.txt
cerber
http://52uo5k3t73ypjije.2agglf.top/245B-F1DC-70FC-006D-FFD5
http://52uo5k3t73ypjije.78dmme.top/245B-F1DC-70FC-006D-FFD5
http://52uo5k3t73ypjije.wz139z.top/245B-F1DC-70FC-006D-FFD5
http://52uo5k3t73ypjije.n41n1a.top/245B-F1DC-70FC-006D-FFD5
http://52uo5k3t73ypjije.onion.to/245B-F1DC-70FC-006D-FFD5
http://52uo5k3t73ypjije.onion/245B-F1DC-70FC-006D-FFD5
Extracted
C:\Users\Admin\Music\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{F1DAA76B-1D6B-AFA8-6E5F-A0A43DBE54F5}\\openfiles.exe\"" e2b9bc2b9df69c9817b2b0247043545c_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{F1DAA76B-1D6B-AFA8-6E5F-A0A43DBE54F5}\\openfiles.exe\"" openfiles.exe -
Contacts a large (527) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation openfiles.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\openfiles.lnk e2b9bc2b9df69c9817b2b0247043545c_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\openfiles.lnk openfiles.exe -
Executes dropped EXE 2 IoCs
pid Process 3484 openfiles.exe 1984 openfiles.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\openfiles = "\"C:\\Users\\Admin\\AppData\\Roaming\\{F1DAA76B-1D6B-AFA8-6E5F-A0A43DBE54F5}\\openfiles.exe\"" e2b9bc2b9df69c9817b2b0247043545c_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\openfiles = "\"C:\\Users\\Admin\\AppData\\Roaming\\{F1DAA76B-1D6B-AFA8-6E5F-A0A43DBE54F5}\\openfiles.exe\"" e2b9bc2b9df69c9817b2b0247043545c_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\openfiles = "\"C:\\Users\\Admin\\AppData\\Roaming\\{F1DAA76B-1D6B-AFA8-6E5F-A0A43DBE54F5}\\openfiles.exe\"" openfiles.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\openfiles = "\"C:\\Users\\Admin\\AppData\\Roaming\\{F1DAA76B-1D6B-AFA8-6E5F-A0A43DBE54F5}\\openfiles.exe\"" openfiles.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 34 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp8C0A.bmp" openfiles.exe -
Drops file in Program Files directory 16 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.vbs openfiles.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote.ini openfiles.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.url openfiles.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.url openfiles.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.vbs openfiles.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\DESIGNER.ONE openfiles.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BLANK.ONE openfiles.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.html openfiles.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote-manifest.ini openfiles.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote-PipelineConfig.xml openfiles.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.html openfiles.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.txt openfiles.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\PLANNERS.ONE openfiles.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BUSINESS.ONE openfiles.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\ACADEMIC.ONE openfiles.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.txt openfiles.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2b9bc2b9df69c9817b2b0247043545c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openfiles.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3544 cmd.exe 5116 PING.EXE 2564 cmd.exe 5052 PING.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 2404 taskkill.exe 2020 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\Desktop e2b9bc2b9df69c9817b2b0247043545c_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{F1DAA76B-1D6B-AFA8-6E5F-A0A43DBE54F5}\\openfiles.exe\"" e2b9bc2b9df69c9817b2b0247043545c_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\Desktop openfiles.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{F1DAA76B-1D6B-AFA8-6E5F-A0A43DBE54F5}\\openfiles.exe\"" openfiles.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings openfiles.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 5052 PING.EXE 5116 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe 3484 openfiles.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 3284 e2b9bc2b9df69c9817b2b0247043545c_JaffaCakes118.exe Token: SeDebugPrivilege 2404 taskkill.exe Token: SeDebugPrivilege 3484 openfiles.exe Token: SeDebugPrivilege 1984 openfiles.exe Token: 33 2504 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2504 AUDIODG.EXE Token: SeDebugPrivilege 2020 taskkill.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 3284 e2b9bc2b9df69c9817b2b0247043545c_JaffaCakes118.exe 3484 openfiles.exe 1984 openfiles.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3284 wrote to memory of 3484 3284 e2b9bc2b9df69c9817b2b0247043545c_JaffaCakes118.exe 91 PID 3284 wrote to memory of 3484 3284 e2b9bc2b9df69c9817b2b0247043545c_JaffaCakes118.exe 91 PID 3284 wrote to memory of 3484 3284 e2b9bc2b9df69c9817b2b0247043545c_JaffaCakes118.exe 91 PID 3284 wrote to memory of 2564 3284 e2b9bc2b9df69c9817b2b0247043545c_JaffaCakes118.exe 92 PID 3284 wrote to memory of 2564 3284 e2b9bc2b9df69c9817b2b0247043545c_JaffaCakes118.exe 92 PID 3284 wrote to memory of 2564 3284 e2b9bc2b9df69c9817b2b0247043545c_JaffaCakes118.exe 92 PID 2564 wrote to memory of 2404 2564 cmd.exe 95 PID 2564 wrote to memory of 2404 2564 cmd.exe 95 PID 2564 wrote to memory of 2404 2564 cmd.exe 95 PID 2564 wrote to memory of 5052 2564 cmd.exe 96 PID 2564 wrote to memory of 5052 2564 cmd.exe 96 PID 2564 wrote to memory of 5052 2564 cmd.exe 96 PID 3484 wrote to memory of 4308 3484 openfiles.exe 98 PID 3484 wrote to memory of 4308 3484 openfiles.exe 98 PID 4308 wrote to memory of 4364 4308 msedge.exe 99 PID 4308 wrote to memory of 4364 4308 msedge.exe 99 PID 3484 wrote to memory of 3164 3484 openfiles.exe 100 PID 3484 wrote to memory of 3164 3484 openfiles.exe 100 PID 3484 wrote to memory of 1572 3484 openfiles.exe 101 PID 3484 wrote to memory of 1572 3484 openfiles.exe 101 PID 1572 wrote to memory of 4104 1572 msedge.exe 102 PID 1572 wrote to memory of 4104 1572 msedge.exe 102 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4832 4308 msedge.exe 103 PID 4308 wrote to memory of 4408 4308 msedge.exe 104 PID 4308 wrote to memory of 4408 4308 msedge.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2b9bc2b9df69c9817b2b0247043545c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e2b9bc2b9df69c9817b2b0247043545c_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Roaming\{F1DAA76B-1D6B-AFA8-6E5F-A0A43DBE54F5}\openfiles.exe"C:\Users\Admin\AppData\Roaming\{F1DAA76B-1D6B-AFA8-6E5F-A0A43DBE54F5}\openfiles.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa6f7e46f8,0x7ffa6f7e4708,0x7ffa6f7e47184⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,14491976211037671179,15791047280161858204,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:24⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,14491976211037671179,15791047280161858204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 /prefetch:34⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,14491976211037671179,15791047280161858204,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:84⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14491976211037671179,15791047280161858204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:14⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14491976211037671179,15791047280161858204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:14⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14491976211037671179,15791047280161858204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3900 /prefetch:14⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14491976211037671179,15791047280161858204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4324 /prefetch:14⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14491976211037671179,15791047280161858204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:14⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,14491976211037671179,15791047280161858204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 /prefetch:84⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,14491976211037671179,15791047280161858204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 /prefetch:84⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14491976211037671179,15791047280161858204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:14⤵PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14491976211037671179,15791047280161858204,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4324 /prefetch:14⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14491976211037671179,15791047280161858204,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:14⤵PID:3464
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://52uo5k3t73ypjije.2agglf.top/245B-F1DC-70FC-006D-FFD5?auto3⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa6f7e46f8,0x7ffa6f7e4708,0x7ffa6f7e47184⤵PID:4104
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:4512
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "openfiles.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{F1DAA76B-1D6B-AFA8-6E5F-A0A43DBE54F5}\openfiles.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3544 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "openfiles.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5116
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "e2b9bc2b9df69c9817b2b0247043545c_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\e2b9bc2b9df69c9817b2b0247043545c_JaffaCakes118.exe" > NUL2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "e2b9bc2b9df69c9817b2b0247043545c_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2404
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5052
-
-
-
C:\Users\Admin\AppData\Roaming\{F1DAA76B-1D6B-AFA8-6E5F-A0A43DBE54F5}\openfiles.exeC:\Users\Admin\AppData\Roaming\{F1DAA76B-1D6B-AFA8-6E5F-A0A43DBE54F5}\openfiles.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2640
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3956
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4a4 0x3481⤵
- Suspicious use of AdjustPrivilegeToken
PID:2504
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Discovery
Browser Information Discovery
1Network Service Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
5KB
MD502dbb33a4fdf8c38c13458a77773b1e5
SHA1ac99ac075165a9a50f0371567f3311d3c1b775d3
SHA256fede2d790c01e7c6674860ba5913085f462aa81400658861cb4a818f71bc62a7
SHA512a1f001dfa0c140c46e1dc23237ee68ebf24919687f120e5542e656954b4e1eedf37fb6628e97bd265cb367e3e040042e73bf4dc200a1467b90d47eb356f09438
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
1KB
MD5f256ad41babe453ba4e7390a4d11856b
SHA17e61ca491bd8c594cead211081ccdc5d76ffcde4
SHA25613a46896c38a376a834824a8d3a0e1641fb7df377e4baeb1e135c1cf44db53d8
SHA51209fb822da6435244ab396427101cbf50defacc54e2f4850b2a3f9bcf9710979a105c36daf409c9f0a4c5423047abb9a90ef62d24968c2889c8aa5a72d4fe0e40
-
Filesize
359KB
MD5e2b9bc2b9df69c9817b2b0247043545c
SHA1b9f34acf8cf4326f0519f6025c61f7e00a981521
SHA2565e02f9eb337fa199f0d89267296b27f45836f5e99c97039125f9f0de2971b684
SHA512f5530d4326b2760b175f0a46b2e94afac7797b7306090e95360bd4fc5ec02264b909ea38e2651407b5736b1e16a19adf91afaa151aff5a5476539e6f364d3762
-
Filesize
19KB
MD53a155074114b9e22c6e3f60a427c1eed
SHA1e789e1961a889021c2ae3d5f91c8f2c1bee31b85
SHA25606b496ebfc2033940b7ec203db404a1c3931288e885302373818443f1fa82a01
SHA512a309831e5c054f1e195b6500b375b378518b34108573a379555bca9e55541a7a615ad605d6c16e1692c8cc6e2df1f7c545186c47c8a88d2c223ae2e3b16f1304
-
Filesize
10KB
MD5fcbac91cccaee55d26eaf03e4f4df50f
SHA1150daa74a842d380394424b08906278322b48d4a
SHA256af4ae18f13931dd0d13b696c3a94a7f81cdd094869b4cb0e3bf89a0a502a92f2
SHA512beb8c89af0d4d4e60c6749084f1eb05c7c1981f280970ba17a0d61627f9ada2b68cf7847a186246eec62292639fe8ae11eda17617c726dac75073edeec7926c3
-
Filesize
90B
MD5de6a5ad78c4f66fd6317a2e40564c907
SHA147ed5ad47b2fa426fa25671d0556a06570943347
SHA256e578c0d5e1ebb66fb30e339db917fcf618bfad25fcfe7f754290273dc6a669d2
SHA512a6e872e4d9ae0ea5704254104c931108b8a75671ee460bec457044eec5ebe133c6e928d06394bde06f632364dde5113cee24240ded795850f1199b1bc0be2bea
-
Filesize
213B
MD51c2a24505278e661eca32666d4311ce5
SHA1d1deb57023bbe38a33f0894b6a9a7bbffbfdeeee
SHA2563f0dc6126cf33e7aa725df926a1b7d434eaf62a69f42e1b8ae4c110fd3572628
SHA512ce866f2c4b96c6c7c090f4bf1708bfebdfcd58ce65a23bdc124a13402ef4941377c7e286e6156a28bd229e422685454052382f1f532545bc2edf07be4861b36c