Analysis
-
max time kernel
103s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 12:12
Behavioral task
behavioral1
Sample
e916ca40f4f70cdd59adb2c8d16282bd_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
e916ca40f4f70cdd59adb2c8d16282bd_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
e916ca40f4f70cdd59adb2c8d16282bd
-
SHA1
64f370a72924eda7b0c670505a4efdaa543b3998
-
SHA256
13c8458ee837d0540352ed9f49d434739b9906738c857cd4d404b2335924b058
-
SHA512
d4411a33f85b42a7c98572b0a63b19b2f176b6685c8c7ad095943fed44f44a44c4b82892036283aab69bc894b6fe100445061cbd9a7251bf4bbb44fe24ca13ac
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZv:0UzeyQMS4DqodCnoe+iitjWwwb
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e916ca40f4f70cdd59adb2c8d16282bd_JaffaCakes118.exe e916ca40f4f70cdd59adb2c8d16282bd_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e916ca40f4f70cdd59adb2c8d16282bd_JaffaCakes118.exe e916ca40f4f70cdd59adb2c8d16282bd_JaffaCakes118.exe -
Executes dropped EXE 55 IoCs
pid Process 1556 explorer.exe 3232 explorer.exe 3524 spoolsv.exe 4420 spoolsv.exe 1524 spoolsv.exe 604 spoolsv.exe 1040 spoolsv.exe 3616 spoolsv.exe 4684 spoolsv.exe 2544 spoolsv.exe 4880 spoolsv.exe 1000 spoolsv.exe 2252 spoolsv.exe 3360 spoolsv.exe 512 spoolsv.exe 2004 spoolsv.exe 4280 spoolsv.exe 3316 spoolsv.exe 1616 spoolsv.exe 4424 spoolsv.exe 2144 spoolsv.exe 116 spoolsv.exe 4204 spoolsv.exe 836 spoolsv.exe 4012 spoolsv.exe 3092 spoolsv.exe 3724 explorer.exe 2984 spoolsv.exe 1900 spoolsv.exe 2880 spoolsv.exe 2080 spoolsv.exe 1828 explorer.exe 1544 spoolsv.exe 2036 spoolsv.exe 2280 spoolsv.exe 4460 explorer.exe 2748 spoolsv.exe 4724 spoolsv.exe 4220 spoolsv.exe 3816 spoolsv.exe 4520 explorer.exe 2356 spoolsv.exe 2212 spoolsv.exe 4728 spoolsv.exe 4992 spoolsv.exe 3064 explorer.exe 5172 spoolsv.exe 5560 spoolsv.exe 5596 explorer.exe 5860 spoolsv.exe 5944 spoolsv.exe 5168 spoolsv.exe 5504 spoolsv.exe 5552 spoolsv.exe 4752 explorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 14 IoCs
description pid Process procid_target PID 1440 set thread context of 536 1440 e916ca40f4f70cdd59adb2c8d16282bd_JaffaCakes118.exe 99 PID 1556 set thread context of 3232 1556 explorer.exe 103 PID 3524 set thread context of 3092 3524 spoolsv.exe 127 PID 4420 set thread context of 1900 4420 spoolsv.exe 130 PID 1524 set thread context of 2080 1524 spoolsv.exe 132 PID 604 set thread context of 2036 604 spoolsv.exe 135 PID 1040 set thread context of 2280 1040 spoolsv.exe 136 PID 3616 set thread context of 4724 3616 spoolsv.exe 139 PID 4684 set thread context of 3816 4684 spoolsv.exe 141 PID 2544 set thread context of 2212 2544 spoolsv.exe 144 PID 4880 set thread context of 4992 4880 spoolsv.exe 146 PID 1000 set thread context of 5560 1000 spoolsv.exe 149 PID 2252 set thread context of 5944 2252 spoolsv.exe 152 PID 3360 set thread context of 5552 3360 spoolsv.exe 155 -
Drops file in Windows directory 44 IoCs
description ioc Process File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini e916ca40f4f70cdd59adb2c8d16282bd_JaffaCakes118.exe File opened for modification \??\c:\windows\system\explorer.exe e916ca40f4f70cdd59adb2c8d16282bd_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 57 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e916ca40f4f70cdd59adb2c8d16282bd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e916ca40f4f70cdd59adb2c8d16282bd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 536 e916ca40f4f70cdd59adb2c8d16282bd_JaffaCakes118.exe 536 e916ca40f4f70cdd59adb2c8d16282bd_JaffaCakes118.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe -
Suspicious use of SetWindowsHookEx 30 IoCs
pid Process 536 e916ca40f4f70cdd59adb2c8d16282bd_JaffaCakes118.exe 536 e916ca40f4f70cdd59adb2c8d16282bd_JaffaCakes118.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3232 explorer.exe 3092 spoolsv.exe 3092 spoolsv.exe 1900 spoolsv.exe 1900 spoolsv.exe 2080 spoolsv.exe 2080 spoolsv.exe 2036 spoolsv.exe 2036 spoolsv.exe 2280 spoolsv.exe 2280 spoolsv.exe 4724 spoolsv.exe 4724 spoolsv.exe 3816 spoolsv.exe 3816 spoolsv.exe 2212 spoolsv.exe 2212 spoolsv.exe 4992 spoolsv.exe 4992 spoolsv.exe 5560 spoolsv.exe 5560 spoolsv.exe 5944 spoolsv.exe 5944 spoolsv.exe 5552 spoolsv.exe 5552 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1440 wrote to memory of 3080 1440 e916ca40f4f70cdd59adb2c8d16282bd_JaffaCakes118.exe 89 PID 1440 wrote to memory of 3080 1440 e916ca40f4f70cdd59adb2c8d16282bd_JaffaCakes118.exe 89 PID 1440 wrote to memory of 536 1440 e916ca40f4f70cdd59adb2c8d16282bd_JaffaCakes118.exe 99 PID 1440 wrote to memory of 536 1440 e916ca40f4f70cdd59adb2c8d16282bd_JaffaCakes118.exe 99 PID 1440 wrote to memory of 536 1440 e916ca40f4f70cdd59adb2c8d16282bd_JaffaCakes118.exe 99 PID 1440 wrote to memory of 536 1440 e916ca40f4f70cdd59adb2c8d16282bd_JaffaCakes118.exe 99 PID 1440 wrote to memory of 536 1440 e916ca40f4f70cdd59adb2c8d16282bd_JaffaCakes118.exe 99 PID 536 wrote to memory of 1556 536 e916ca40f4f70cdd59adb2c8d16282bd_JaffaCakes118.exe 100 PID 536 wrote to memory of 1556 536 e916ca40f4f70cdd59adb2c8d16282bd_JaffaCakes118.exe 100 PID 536 wrote to memory of 1556 536 e916ca40f4f70cdd59adb2c8d16282bd_JaffaCakes118.exe 100 PID 1556 wrote to memory of 3232 1556 explorer.exe 103 PID 1556 wrote to memory of 3232 1556 explorer.exe 103 PID 1556 wrote to memory of 3232 1556 explorer.exe 103 PID 1556 wrote to memory of 3232 1556 explorer.exe 103 PID 1556 wrote to memory of 3232 1556 explorer.exe 103 PID 3232 wrote to memory of 3524 3232 explorer.exe 104 PID 3232 wrote to memory of 3524 3232 explorer.exe 104 PID 3232 wrote to memory of 3524 3232 explorer.exe 104 PID 3232 wrote to memory of 4420 3232 explorer.exe 105 PID 3232 wrote to memory of 4420 3232 explorer.exe 105 PID 3232 wrote to memory of 4420 3232 explorer.exe 105 PID 3232 wrote to memory of 1524 3232 explorer.exe 106 PID 3232 wrote to memory of 1524 3232 explorer.exe 106 PID 3232 wrote to memory of 1524 3232 explorer.exe 106 PID 3232 wrote to memory of 604 3232 explorer.exe 107 PID 3232 wrote to memory of 604 3232 explorer.exe 107 PID 3232 wrote to memory of 604 3232 explorer.exe 107 PID 3232 wrote to memory of 1040 3232 explorer.exe 108 PID 3232 wrote to memory of 1040 3232 explorer.exe 108 PID 3232 wrote to memory of 1040 3232 explorer.exe 108 PID 3232 wrote to memory of 3616 3232 explorer.exe 109 PID 3232 wrote to memory of 3616 3232 explorer.exe 109 PID 3232 wrote to memory of 3616 3232 explorer.exe 109 PID 3232 wrote to memory of 4684 3232 explorer.exe 110 PID 3232 wrote to memory of 4684 3232 explorer.exe 110 PID 3232 wrote to memory of 4684 3232 explorer.exe 110 PID 3232 wrote to memory of 2544 3232 explorer.exe 111 PID 3232 wrote to memory of 2544 3232 explorer.exe 111 PID 3232 wrote to memory of 2544 3232 explorer.exe 111 PID 3232 wrote to memory of 4880 3232 explorer.exe 112 PID 3232 wrote to memory of 4880 3232 explorer.exe 112 PID 3232 wrote to memory of 4880 3232 explorer.exe 112 PID 3232 wrote to memory of 1000 3232 explorer.exe 113 PID 3232 wrote to memory of 1000 3232 explorer.exe 113 PID 3232 wrote to memory of 1000 3232 explorer.exe 113 PID 3232 wrote to memory of 2252 3232 explorer.exe 114 PID 3232 wrote to memory of 2252 3232 explorer.exe 114 PID 3232 wrote to memory of 2252 3232 explorer.exe 114 PID 3232 wrote to memory of 3360 3232 explorer.exe 115 PID 3232 wrote to memory of 3360 3232 explorer.exe 115 PID 3232 wrote to memory of 3360 3232 explorer.exe 115 PID 3232 wrote to memory of 512 3232 explorer.exe 116 PID 3232 wrote to memory of 512 3232 explorer.exe 116 PID 3232 wrote to memory of 512 3232 explorer.exe 116 PID 3232 wrote to memory of 2004 3232 explorer.exe 117 PID 3232 wrote to memory of 2004 3232 explorer.exe 117 PID 3232 wrote to memory of 2004 3232 explorer.exe 117 PID 3232 wrote to memory of 4280 3232 explorer.exe 118 PID 3232 wrote to memory of 4280 3232 explorer.exe 118 PID 3232 wrote to memory of 4280 3232 explorer.exe 118 PID 3232 wrote to memory of 3316 3232 explorer.exe 119 PID 3232 wrote to memory of 3316 3232 explorer.exe 119 PID 3232 wrote to memory of 3316 3232 explorer.exe 119 PID 3232 wrote to memory of 1616 3232 explorer.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\e916ca40f4f70cdd59adb2c8d16282bd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e916ca40f4f70cdd59adb2c8d16282bd_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:3080
-
-
C:\Users\Admin\AppData\Local\Temp\e916ca40f4f70cdd59adb2c8d16282bd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e916ca40f4f70cdd59adb2c8d16282bd_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:536 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1556 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3232 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3524 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3092 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3724 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5760
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4420 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1900
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1524 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2080 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1828 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5076
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:604 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2036
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1040 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2280 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4460 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2256
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3616 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4724
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4684 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3816 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4520 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5836
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2544 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2212
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4880 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4992 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3064 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5368
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1000 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5560 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5596 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5960
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2252 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5944
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3360 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5552 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4752 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5820
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:512 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:6084
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2004 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5212
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5264
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:428
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4280 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4024
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3316 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:6076
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:6116
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5460
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1616 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5336
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4424 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5952
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5984
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3992
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2144 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5164
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:116 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5192
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3428
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1444
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4204 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4816
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:836 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5824
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5768
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5516
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4012 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2200
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4388
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1408
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2984 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5588
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2880 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3236
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3924
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:228
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1544 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:768
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5612
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2748 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4004
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4220 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3312
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2356 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3624
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4728 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1712
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4480
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5172 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5456
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5860 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:6040
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5168 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2328
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5504 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3112
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6060
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2528
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:6028
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5432
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5916
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5428
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6112
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2836
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5792
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4408
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4504
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3764
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5316
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2852
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5724
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4568
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4668
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3392
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6024
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5444
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1540
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5044
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5376
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5480
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1864
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3240
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5844
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2156
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4332
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3612
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3860
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4900
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5568
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5628
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5812
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1876
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:860
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5400
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4896
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6136
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5096
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:1332
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3824,i,6510295916244954942,10164894160290787457,262144 --variations-seed-version --mojo-platform-channel-handle=4436 /prefetch:81⤵PID:4896
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD5eb7bc40b7726cbefec9b284986bf7645
SHA1fcdb5c5c49159835c18c77b9a154c36d2429358d
SHA2560bb6fb5807c249df522d9f2acda36ae191b2c329e09b65a1ece897424e5ef863
SHA51298616a61294d6d286f74839e1ee41fe7cecb0b60c6a16da1e7f074ab7717ca142c6ae43dfb0102da08b530ec5bc78e92f16220f3a1db17917d52e1fc81ec6f9c
-
Filesize
2.2MB
MD597cae94ecede1484f7747440282b4525
SHA1a39ff91caf178dabfcb13ee4a600ad9508c28bb5
SHA2563e0de3e490d87230ec165a2ed99c7d718e3b33ac3e5a6801ad841ddd4c099b8e
SHA512ec50dd07a7c6dd7cf301b855cf88f4ef98a7bbe84546dd8e0e366b80cb1bd3c1b626e33d6978c20d383a726d3c75b59265586ce4e30b1abb4b1cef9d97f5f2a4