Analysis
-
max time kernel
146s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 08:57
Static task
static1
Behavioral task
behavioral1
Sample
ef74f29fa2307786d3ba3675148a996c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef74f29fa2307786d3ba3675148a996c_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
ef74f29fa2307786d3ba3675148a996c_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
ef74f29fa2307786d3ba3675148a996c
-
SHA1
d485bb0ea460ee1cff79fab0a74cceea9e44bd79
-
SHA256
589c911b88667a5d71cce32dedf39b609cf047947824c2ef03c9943ac61f5861
-
SHA512
d24a64d1094bcaacbed05f3b762ab9435c9ee2832ee579781f56169604de89625bb9112298b95893a5b779a078960ca4f4591630403da5bc4a8fb947366453d9
-
SSDEEP
24576:MPoIBRtXSk8N8Cbw5yLAYNE2bGkaN2Sb3iH2GIBSrWL2jB5iJ7:MPoYDSVN8Cbw5INB7g3urWL2Tu
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\drivers\kiss.she ef74f29fa2307786d3ba3675148a996c_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation ef74f29fa2307786d3ba3675148a996c_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 600 yuyanzhe.dat -
Loads dropped DLL 5 IoCs
pid Process 600 yuyanzhe.dat 600 yuyanzhe.dat 600 yuyanzhe.dat 600 yuyanzhe.dat 600 yuyanzhe.dat -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\ecBLvhm.sys ef74f29fa2307786d3ba3675148a996c_JaffaCakes118.exe File created C:\Windows\SysWOW64\superecLMgjC.sys ef74f29fa2307786d3ba3675148a996c_JaffaCakes118.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\WINDOWS\Help\4.dat yuyanzhe.dat File created C:\WINDOWS\Help\5.dat yuyanzhe.dat File created C:\WINDOWS\Help\6.dat yuyanzhe.dat File created C:\WINDOWS\Help\7.dat yuyanzhe.dat File created C:\WINDOWS\Help\yuyanzhe.dat ef74f29fa2307786d3ba3675148a996c_JaffaCakes118.exe File created C:\WINDOWS\Help\1.dat yuyanzhe.dat File created C:\WINDOWS\Help\2.dat yuyanzhe.dat File created C:\WINDOWS\Help\3.dat yuyanzhe.dat -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef74f29fa2307786d3ba3675148a996c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yuyanzhe.dat Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4176 msedge.exe 4176 msedge.exe 1640 msedge.exe 1640 msedge.exe 2816 identity_helper.exe 2816 identity_helper.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe -
Suspicious behavior: LoadsDriver 4 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 2800 ef74f29fa2307786d3ba3675148a996c_JaffaCakes118.exe 2800 ef74f29fa2307786d3ba3675148a996c_JaffaCakes118.exe 600 yuyanzhe.dat 600 yuyanzhe.dat 600 yuyanzhe.dat 600 yuyanzhe.dat 600 yuyanzhe.dat 600 yuyanzhe.dat 600 yuyanzhe.dat 600 yuyanzhe.dat 600 yuyanzhe.dat -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2800 wrote to memory of 600 2800 ef74f29fa2307786d3ba3675148a996c_JaffaCakes118.exe 85 PID 2800 wrote to memory of 600 2800 ef74f29fa2307786d3ba3675148a996c_JaffaCakes118.exe 85 PID 2800 wrote to memory of 600 2800 ef74f29fa2307786d3ba3675148a996c_JaffaCakes118.exe 85 PID 2800 wrote to memory of 948 2800 ef74f29fa2307786d3ba3675148a996c_JaffaCakes118.exe 92 PID 2800 wrote to memory of 948 2800 ef74f29fa2307786d3ba3675148a996c_JaffaCakes118.exe 92 PID 2800 wrote to memory of 948 2800 ef74f29fa2307786d3ba3675148a996c_JaffaCakes118.exe 92 PID 4676 wrote to memory of 1640 4676 explorer.exe 94 PID 4676 wrote to memory of 1640 4676 explorer.exe 94 PID 1640 wrote to memory of 1368 1640 msedge.exe 96 PID 1640 wrote to memory of 1368 1640 msedge.exe 96 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 3224 1640 msedge.exe 97 PID 1640 wrote to memory of 4176 1640 msedge.exe 98 PID 1640 wrote to memory of 4176 1640 msedge.exe 98 PID 1640 wrote to memory of 5008 1640 msedge.exe 99 PID 1640 wrote to memory of 5008 1640 msedge.exe 99 PID 1640 wrote to memory of 5008 1640 msedge.exe 99 PID 1640 wrote to memory of 5008 1640 msedge.exe 99 PID 1640 wrote to memory of 5008 1640 msedge.exe 99 PID 1640 wrote to memory of 5008 1640 msedge.exe 99 PID 1640 wrote to memory of 5008 1640 msedge.exe 99 PID 1640 wrote to memory of 5008 1640 msedge.exe 99 PID 1640 wrote to memory of 5008 1640 msedge.exe 99 PID 1640 wrote to memory of 5008 1640 msedge.exe 99 PID 1640 wrote to memory of 5008 1640 msedge.exe 99 PID 1640 wrote to memory of 5008 1640 msedge.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef74f29fa2307786d3ba3675148a996c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ef74f29fa2307786d3ba3675148a996c_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\WINDOWS\Help\yuyanzhe.datC:\WINDOWS\Help\yuyanzhe.dat2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:600
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" http://www.9yiwan.com2⤵
- System Location Discovery: System Language Discovery
PID:948
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.9yiwan.com/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffa6f3e46f8,0x7ffa6f3e4708,0x7ffa6f3e47183⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,8690634373542179168,14727957374607286208,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:23⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,8690634373542179168,14727957374607286208,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,8690634373542179168,14727957374607286208,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:83⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,8690634373542179168,14727957374607286208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:13⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,8690634373542179168,14727957374607286208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:13⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,8690634373542179168,14727957374607286208,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 /prefetch:83⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,8690634373542179168,14727957374607286208,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,8690634373542179168,14727957374607286208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:13⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,8690634373542179168,14727957374607286208,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:13⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,8690634373542179168,14727957374607286208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:13⤵PID:5328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,8690634373542179168,14727957374607286208,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:13⤵PID:5336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,8690634373542179168,14727957374607286208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:13⤵PID:5632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,8690634373542179168,14727957374607286208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3564 /prefetch:13⤵PID:5780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,8690634373542179168,14727957374607286208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:13⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,8690634373542179168,14727957374607286208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:13⤵PID:5744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,8690634373542179168,14727957374607286208,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3888 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3136
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2816
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
5KB
MD5b93da5e423916e4b536355b79235e69f
SHA1e68141abfd1a65da7d89284270b321bed1837eec
SHA25659e7d71574832b940b28cf53e17abad6b7cef3920bc5d0ddff4890fa9fbce488
SHA512d4dd73c28b7fb5c66bebc071ec41c1eb9eeb3691d10aeb18e18373bbc1d330d208234aaeb464bfd00091fb0a8003caad686ce07a8154c9c193f639c625469c76
-
Filesize
6KB
MD5ff2c5c36007b1ea3d7edee6c348f9906
SHA1346534f2c353b1386612a97203b0765d156fac71
SHA2560cfbbbe297b39ebed54997c9f085144332ba0a6a0330ab040ba2d1c3e1b127c8
SHA51221e632a9cd49df90c52e662658186663555595d8f9738baa20a04309785c5867f1e273de30f2ba8cb5d917cbd02465ba02cf4f04822b60133a2c32465233b98d
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5342765a13ee77054770205aaf23b23bc
SHA17bbf2d5615822b1c4806c4a55fdbf571145d0f8b
SHA256cd51d179d6d7db16711e31a710dfe4b703b8ea5d1025bf71ba4e36011576eb4e
SHA5129389715a345209f3f116e6d77adf865a4285530a8896d2391871712cf9cfa381a84cce97ae36e67425f6c92643ee588800972901354c6f5cc46fc96a0f54c2db
-
Filesize
112KB
MD56d4b2e73f6f8ecff02f19f7e8ef9a8c7
SHA109c32ca167136a17fd69df8c525ea5ffeca6c534
SHA256fe5783e64aa70fac10c2e42d460732d9770534357329d8bc78576557c165f040
SHA5122fd7a95cb632e9c4ac6b34e5b6b875aae94e73cd4b1f213e78f46dadab4846227a030776461bca08f9d75a1d61a0d45427f7b0c8b71406b7debc14db04b2ce04
-
Filesize
192KB
MD50503d44bada9a0c7138b3f7d3ab90693
SHA1c4ea03151eeedd1c84beaa06e73faa9c1e9574fc
SHA2567c077b6806738e62a9c2e38cc2ffefefd362049e3780b06a862210f1350d003e
SHA512f14dfa273b514753312e1dfc873ac501d6aa7bbd17cd63d16f3bcb9caddcb5ea349c072e73448a2beb3b1010c674be9c8ad22257d8c7b65a3a05e77e69d3b7a8
-
Filesize
1.1MB
MD5638e737b2293cf7b1f14c0b4fb1f3289
SHA1f8e2223348433b992a8c42c4a7a9fb4b5c1158bc
SHA256baad4798c3ab24dec8f0ac3cde48e2fee2e2dffa60d2b2497cd295cd6319fd5b
SHA5124d714a0980238c49af10376ff26ec9e6415e7057925b32ec1c24780c3671047ac5b5670e46c1c6cf9f160519be8f37e1e57f05c30c6c4bda3b275b143aa0bf12
-
Filesize
701KB
MD5b0c54f02bbdc2f4c746dac2f9734740a
SHA1858775d7fd56732c1f99fb403eeec4c95eeb4a5b
SHA25669649fd2234c05e1a8c04b777a17bdb2d85e60a7de246a53cdca30cd34fd7c8e
SHA51240eefe0e9b004405738ff612171f03e343eceee6278275b93d4c6afb5ab7c94ea9847ea918ef01aab9e63e35a6e0c9108abfb5a87831b5fa63c4336b6c044680