Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:53
Static task
static1
Behavioral task
behavioral1
Sample
eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe
-
Size
171KB
-
MD5
eacc26a7f13e6d7966a24a203be1209c
-
SHA1
eca7e96b7f7281258482a7b6a6321040ff5005dd
-
SHA256
00e860faee4a41a04548e6d192752025ff3e7797b5ea79af28ec79717967a412
-
SHA512
9700680580a38c3ebc9aa06b168f20e49c8c99ff306d606f13bc90b85f9e081aa5bfb813d66af02a270ec8c828fc6a5fe62d5ade44476ad1c1ca25b8c6dd22cd
-
SSDEEP
3072:HyqBbuCxjjuRmh/EPcBJK5OTOHP4PbCHdBABuH/hci+PIZsRu:H7BbuCxjjZUsJKcTOv4JBbSZ
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wmplayer = "C:\\MessengerPlus\\mplayer2.exe" eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4992 1052 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Internet Explorer\Download eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "00000001" eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 49 IoCs
pid Process 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 2728 msedge.exe 2728 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 116 identity_helper.exe 116 identity_helper.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4264 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4264 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1052 wrote to memory of 4572 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 90 PID 1052 wrote to memory of 4572 1052 eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe 90 PID 4572 wrote to memory of 3012 4572 msedge.exe 91 PID 4572 wrote to memory of 3012 4572 msedge.exe 91 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 3172 4572 msedge.exe 92 PID 4572 wrote to memory of 2728 4572 msedge.exe 93 PID 4572 wrote to memory of 2728 4572 msedge.exe 93 PID 4572 wrote to memory of 3868 4572 msedge.exe 94 PID 4572 wrote to memory of 3868 4572 msedge.exe 94 PID 4572 wrote to memory of 3868 4572 msedge.exe 94 PID 4572 wrote to memory of 3868 4572 msedge.exe 94 PID 4572 wrote to memory of 3868 4572 msedge.exe 94 PID 4572 wrote to memory of 3868 4572 msedge.exe 94 PID 4572 wrote to memory of 3868 4572 msedge.exe 94 PID 4572 wrote to memory of 3868 4572 msedge.exe 94 PID 4572 wrote to memory of 3868 4572 msedge.exe 94 PID 4572 wrote to memory of 3868 4572 msedge.exe 94 PID 4572 wrote to memory of 3868 4572 msedge.exe 94 PID 4572 wrote to memory of 3868 4572 msedge.exe 94 PID 4572 wrote to memory of 3868 4572 msedge.exe 94 PID 4572 wrote to memory of 3868 4572 msedge.exe 94 PID 4572 wrote to memory of 3868 4572 msedge.exe 94 PID 4572 wrote to memory of 3868 4572 msedge.exe 94 PID 4572 wrote to memory of 3868 4572 msedge.exe 94 PID 4572 wrote to memory of 3868 4572 msedge.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eacc26a7f13e6d7966a24a203be1209c_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1052 -s 3882⤵
- Program crash
PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.youtube.com/watch?v=FvCdqOQZQuk2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdaf2546f8,0x7ffdaf254708,0x7ffdaf2547183⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,5916740317274968836,14055929252187923302,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:23⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,5916740317274968836,14055929252187923302,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,5916740317274968836,14055929252187923302,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:83⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5916740317274968836,14055929252187923302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:13⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5916740317274968836,14055929252187923302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:13⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5916740317274968836,14055929252187923302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:13⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5916740317274968836,14055929252187923302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:13⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2120,5916740317274968836,14055929252187923302,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3972 /prefetch:83⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,5916740317274968836,14055929252187923302,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5452 /prefetch:83⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,5916740317274968836,14055929252187923302,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5452 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5916740317274968836,14055929252187923302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:13⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5916740317274968836,14055929252187923302,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:13⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5916740317274968836,14055929252187923302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:13⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5916740317274968836,14055929252187923302,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:13⤵PID:800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,5916740317274968836,14055929252187923302,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1976 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2428
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1052 -ip 10521⤵PID:2148
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2632
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4348
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4580
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f4 0x4ec1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD5bc881fad0f8db8f2f345452d89e0744f
SHA1beab5507446a467c84c3410479b82b3b044192b5
SHA256e950ca4c56473c0e64c1786687ee06adde0da4d4c5c04c308692018cf052a6c2
SHA512fa6b204eee4979664e3279f432a450224e67de28cb61849aa4cbc08e9594cea44d928609576d03f7d9442f4672892b538e1cc5542f497de9c07fc618281cc221
-
Filesize
2KB
MD5bc8c73b95f7b7653c323235fd74cdcd4
SHA143cfb74e74c53a417fec7aef5ffcb7fb48a54101
SHA2563751cb0e74722a9dc8c888f942fc7b302acd1ca856c1d858050b2f93e2921f13
SHA512212c9bc196113312c89b186f2b0566d240ef28710f3a04992c4c452412bc4644bbc36b84d968a6b03514c22d55520f52c9736885aba63f422e20c0f56de56cd1
-
Filesize
2KB
MD5987fee01c5074f85545ad08ab3b7651b
SHA19551e8b02333cf7bc44609305a95f75b2cb96ca0
SHA256a38ffd2bc28c6a4a1ed089c204909856fbc90eb21a5d3d858b792d922f3e4a0a
SHA5127739f59f4a83e799c49a9eefd0df5141b134f7c590005fe9ac8ad82b3923634e537095f89a6214456b3a0a947d76fbae75c969c918ff5b6b24a3f8e1af2befe8
-
Filesize
5KB
MD5f61066f7821f24b1e2379c4ff69fb672
SHA179ee921b9097dd359b1655f0de7f223f1e81b86b
SHA256cb7f53951e8d1d5ffc3832c7562b532acc00c9338a03c887fa9f13232fce1f19
SHA5121f002d88a6274fafb715600fd6b858e8a4fe1e5a7c0037b62ff3b230ae51e6b3acc2ee12844904437ab7aca86dcdeb543406b20504cbbbd57ca197261a89b3e5
-
Filesize
6KB
MD5ab8011ca553b63e6f4f3c1d517d17769
SHA1a68d89bfb008d72fc293e0be554b6c2d8f984efe
SHA25659878f63609aab602d1ddb0d51e8a4d1ad1749e079fade2e132147d25c62b3b8
SHA5123651ef3d236eb979d8b2481399f1ea4736721a255d66bba54a172ebc0053fe7f30abc254bdef75a80e377c8a2d459a449516d596e1401fbcacb7a0c921d22660
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\d79ac64d-9da2-41e7-9952-cf427c19c7cd\index-dir\the-real-index
Filesize2KB
MD53781a40056c471ef460e8e550044ad9f
SHA1a092532a155b8237e625ea81e4fb1f0cb2cda3f1
SHA256d81ef1727dc47d830b75bdce199d53880f0e6cb0143fef60169b6b63dbe3d9c5
SHA512d66caafc8e3e2153bf9f569d8ea803a4374c4a48dbefab20c41a2b429aa2102a390b32818333b2d383b6f99257c88a99ab8ff3b641e359a885f0dd5e84658469
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\d79ac64d-9da2-41e7-9952-cf427c19c7cd\index-dir\the-real-index~RFe57ef42.TMP
Filesize48B
MD5e4a0e6e8c6f586ecdfa5878cddf1be0e
SHA113390bc5f7bc47e7cdcfa46cce280d07282ff582
SHA256047fec564453e599c586103ea4923f2359fa9f88032131d6e6bdeab64d7af4a4
SHA512d9c51080483e32e6547931504dfb8deb24cc02209089657779476bce2fcfd59d81880e11861801432579b8430202e99ac9957daf39db876561d9faa8680a0392
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize146B
MD571d5ece73520b31a106bd15b1384f740
SHA1604d0df19dfed3642d67645598b6163e5fee8f18
SHA256f094595df2c2ae4364e70a2497813844e3eab3d9981955e7be9ed1500dcca0bb
SHA5122edfd4f35e4327dbfee240dfbe73e5abaa523e72d92918cdd1b9da47827f264f6e78057dbd69e9acc113164f4c45f9f38c0ed4e4d33a3aa46115a4900135d6c0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize82B
MD58babb9d42b6886ff6a1ba6b68c79bf8f
SHA15622b122fa71d0f8f085d66241c4267769cee363
SHA256249877ef8ae236e046735dadd7d5809202a1110bbc02f0a32eee670dd045a96b
SHA51291dfe4042f0381376fe83814bd35df3b6df90ad836ef126741c0d756426f914c7634e3892c8802004dcf4d64df9cdc7d5a93e113f4659fe31117c0314274faf3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize84B
MD5853887624759e3251dff4fd83538d39d
SHA17d88115d6eb665968c3ae1eeb75457cbdb40a5b5
SHA25639802246124458ec4ac7d905237a9f30c0c8b67f761c8d7e0163b7d3d5c2943f
SHA5128d732b081d6921ec60a7bee2e9afd12ffc8a46379f4ca4e6321d9573708c3c27373dc56d5267f6486812125ff9479ec0674b4602b4866d106749cda2ca44dc29
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe579942.TMP
Filesize89B
MD5c3c53c8a5950321d2ad8c38837ec9b5a
SHA1a1bc706c1b6f94b05504ec9be6d629e05868a4f2
SHA2568cda39da8cf53ccf22e7c714e1ffd322cc44d9addd7e26444bae2d06e92afc6f
SHA51241ae0efa39c96e8f35e748a5cd63995e3469f30555a76b718ee25cd55624e05b35ad17c3ef0299bd94fedc83d2a3b7de559573c611331473e152f230a17feec4
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD587f874a01d07521b757d680b20d1fde6
SHA16c03945dc3c6681aab64510c0d800bae52e117ff
SHA2565972b2ce7cadfd19e57e6c7b32e78d67dd551f12ab12146fbbbf58a03bfcac0a
SHA512335c4ba6d7266cb519202d74d78617521860daab4b7099160f37f5a916db75200f4b7a1188f5b4e788ed0caec555ae17d8ff671b6b55ae5630b26ea71e3e2c7b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57e89b.TMP
Filesize48B
MD5aaa760a219fc0571a5d85a8b650c0642
SHA15f6cf5f0a3074f5fe39dac68156d3c24c7e27f18
SHA25675d3c9410665ea878484c64d2bf888b4c367a01369df5c0b4103c77faf6bc41c
SHA5128a818e9e82dc41da629b108dd0009f447a0dd028c85b2a8325e866258140c4e9bc093875925e968aafb1b4fc5d2dcfb569f33600b0139593054a2a4d9e753e79
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD590da5a3966d322f20b340d6294fe748f
SHA1fc675b5028d85cedd27cd0fa0e405e9009bfa898
SHA2562306cdb7a8b1ab8f3ae33147f2f97025f347bc8bd6ce4543e858135a05f13182
SHA5122d35297c9cce26dc7f63613a16ac552c4781c7428eee513bc2a5c05cfb3540c0da45fbb79d7836ffc54ac4a52a3cea357b7b69a6d02d42ca5caf6b5e3a7572bc