Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    84s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/09/2024, 03:49

General

  • Target

    f9a7c8ec8d166ab1bd3c3782e9b80acf_JaffaCakes118.exe

  • Size

    275KB

  • MD5

    f9a7c8ec8d166ab1bd3c3782e9b80acf

  • SHA1

    7d7d97d423bf806196446c9c766cd0f69a86189d

  • SHA256

    c37cd29d8d3d1aa6dd46b2e41fcd723590058b172a1b81b0a6feb97d34498687

  • SHA512

    0b2f792aa92b95a25ebae01eb8f00172d4ee5079e3c2463dfffa0d6d5dcfe0a25551ff04eb8da132f76a231b1261fb83e444990328a5a2ec6eb860cd09854e42

  • SSDEEP

    3072:UJBVjSN+WomNyI9NG7s2rI2uRerWpT/U6yvZX42TWALuKVyI9K3gxlUQh/AjdHoM:6SyWN126EWpAK2pZVj9K3mAj1nd

Malware Config

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 13 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables taskbar notifications via registry modification
  • Executes dropped EXE 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 20 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9a7c8ec8d166ab1bd3c3782e9b80acf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f9a7c8ec8d166ab1bd3c3782e9b80acf_JaffaCakes118.exe"
    1⤵
    • Modifies security service
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4540
    • C:\Users\Admin\AppData\Local\Temp\f9a7c8ec8d166ab1bd3c3782e9b80acf_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f9a7c8ec8d166ab1bd3c3782e9b80acf_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\58DD3\1DED3.exe%C:\Users\Admin\AppData\Roaming\58DD3
      2⤵
        PID:4492
      • C:\Users\Admin\AppData\Local\Temp\f9a7c8ec8d166ab1bd3c3782e9b80acf_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\f9a7c8ec8d166ab1bd3c3782e9b80acf_JaffaCakes118.exe startC:\Program Files (x86)\D312D\lvvm.exe%C:\Program Files (x86)\D312D
        2⤵
          PID:1296
        • C:\Program Files (x86)\LP\D3A5\460.tmp
          "C:\Program Files (x86)\LP\D3A5\460.tmp"
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2848
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2088
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2504
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2672
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2356
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:4824
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3716
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:1532
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:3764
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of SendNotifyMessage
        PID:4416
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:4824
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2632
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:4484
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:4476
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:1412
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:4576
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:4640
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:3876
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:3804
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:4484
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:5064
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:436
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:3444
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:4052
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        PID:1748
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:3892
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:5064
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:4288
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:4520
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:1296
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:3668
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:3996
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:388
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:3508
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:2116
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:404
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Modifies registry class
        PID:4968
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
          PID:2988
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
            PID:3596
          • C:\Windows\explorer.exe
            explorer.exe
            1⤵
              PID:4620
            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
              1⤵
                PID:3552
              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                1⤵
                  PID:3080
                • C:\Windows\explorer.exe
                  explorer.exe
                  1⤵
                    PID:2368
                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                    1⤵
                      PID:1908
                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                      1⤵
                        PID:3140
                      • C:\Windows\explorer.exe
                        explorer.exe
                        1⤵
                          PID:3256
                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                          1⤵
                            PID:4644
                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                            1⤵
                              PID:3212
                            • C:\Windows\explorer.exe
                              explorer.exe
                              1⤵
                                PID:1600
                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                1⤵
                                  PID:3684
                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                  1⤵
                                    PID:436
                                  • C:\Windows\explorer.exe
                                    explorer.exe
                                    1⤵
                                      PID:4748
                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                      1⤵
                                        PID:2876
                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                        1⤵
                                          PID:4388
                                        • C:\Windows\explorer.exe
                                          explorer.exe
                                          1⤵
                                            PID:4600
                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                            1⤵
                                              PID:5036
                                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                              1⤵
                                                PID:448
                                              • C:\Windows\explorer.exe
                                                explorer.exe
                                                1⤵
                                                  PID:728
                                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                  1⤵
                                                    PID:2648
                                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                    1⤵
                                                      PID:3604
                                                    • C:\Windows\explorer.exe
                                                      explorer.exe
                                                      1⤵
                                                        PID:528
                                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                        1⤵
                                                          PID:1940
                                                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                          1⤵
                                                            PID:388
                                                          • C:\Windows\explorer.exe
                                                            explorer.exe
                                                            1⤵
                                                              PID:2116
                                                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                              1⤵
                                                                PID:4288
                                                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                1⤵
                                                                  PID:4816
                                                                • C:\Windows\explorer.exe
                                                                  explorer.exe
                                                                  1⤵
                                                                    PID:2312
                                                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                    1⤵
                                                                      PID:2348
                                                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                      1⤵
                                                                        PID:2424
                                                                      • C:\Windows\explorer.exe
                                                                        explorer.exe
                                                                        1⤵
                                                                          PID:4732
                                                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                          1⤵
                                                                            PID:1700
                                                                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                            1⤵
                                                                              PID:2980
                                                                            • C:\Windows\explorer.exe
                                                                              explorer.exe
                                                                              1⤵
                                                                                PID:1836
                                                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                1⤵
                                                                                  PID:2704
                                                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                  1⤵
                                                                                    PID:5108
                                                                                  • C:\Windows\explorer.exe
                                                                                    explorer.exe
                                                                                    1⤵
                                                                                      PID:4080

                                                                                    Network

                                                                                    MITRE ATT&CK Enterprise v15

                                                                                    Replay Monitor

                                                                                    Loading Replay Monitor...

                                                                                    Downloads

                                                                                    • C:\Program Files (x86)\LP\D3A5\460.tmp

                                                                                      Filesize

                                                                                      104KB

                                                                                      MD5

                                                                                      5bb3c2660ef3ebb33c51de289dbbba84

                                                                                      SHA1

                                                                                      9046cbe8ca28e8b7439f68c2d86da3f4b20e6bc3

                                                                                      SHA256

                                                                                      d8c41b10dae1fe85b0a269c60a0c01137f276dd62f654345fae6d3ca847f24d6

                                                                                      SHA512

                                                                                      dfa5f619761848cb757429ff255e657acb353137e094db655f0899df7e6a2eec54c7499c9e47233542b25f37747f46a1186fa9ac7f7a150aed73c40ecc1cb581

                                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9

                                                                                      Filesize

                                                                                      471B

                                                                                      MD5

                                                                                      a8a5fa5af16b818c5f2ea9a115191552

                                                                                      SHA1

                                                                                      6c2235840a046b1c67411fdfc5f0646e08311e78

                                                                                      SHA256

                                                                                      7e76ee2b57d2f8cce4b063443e240ddc416cc18b393f957bb8589595e9485fc1

                                                                                      SHA512

                                                                                      56fb7f9cd4091ecca5053abfcb02c8af15edd186e647e6d95d9813d9dc0a31ce537cb14061865f3af96e165ff6245a7a376e6128f59eef764ef56f52da46da0e

                                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9

                                                                                      Filesize

                                                                                      420B

                                                                                      MD5

                                                                                      a5b492229c487e001cd5afd576e85cf0

                                                                                      SHA1

                                                                                      33525735f91d3073d4b2d4c2670e267ab07b104e

                                                                                      SHA256

                                                                                      049487ba457d9e172a2a3c62d623dbb3d71b04298e0e5aa0f2702ac2d2b17544

                                                                                      SHA512

                                                                                      8f77cad697a45913275ffe2e68fc4ed4244956311edc5a069ee233535f163897592de36e1cd1414d482f3881f121c238e14b77527e9aa268c6bb85dd8ddbee4a

                                                                                    • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres

                                                                                      Filesize

                                                                                      2KB

                                                                                      MD5

                                                                                      b1a760e0ab361388b2f299f4cfc2bcf2

                                                                                      SHA1

                                                                                      a15c6881370f8771aa718624c5fbe48ff1b1ef88

                                                                                      SHA256

                                                                                      7f6d185ebd56075bddf83a87502881fc8dcf2a541f38c05c36f82e53c924d2a5

                                                                                      SHA512

                                                                                      599779ca5596bba02f33903c1ae8742f34385835591841e37258fc89c8b5f95b1322fefc2a216b00ed132a9fff6d2c3695607eb3158cdc5f94b17bdd93fba64d

                                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ZLWU0D9R\microsoft.windows[1].xml

                                                                                      Filesize

                                                                                      97B

                                                                                      MD5

                                                                                      165c4eb495a1e55b6aa27652f79faaa1

                                                                                      SHA1

                                                                                      2a72fe3964fdace12d0527f52b806e545d9797b2

                                                                                      SHA256

                                                                                      d694847a55f98886fbb45c6cd2b0fed95d9cd7448660cd023c909b3659d1f51c

                                                                                      SHA512

                                                                                      e749ffaf79a8b65f26500c72b3bdacd79c564b89ea16198695892840873ede2b63fda3c6d32480cc5296d7662f91332f83674a5170475d606912af20e5f14367

                                                                                    • C:\Users\Admin\AppData\Roaming\58DD3\312D.8DD

                                                                                      Filesize

                                                                                      1KB

                                                                                      MD5

                                                                                      4dae07448f0bde5a5c8957511e545ef3

                                                                                      SHA1

                                                                                      a2a5e3498328a910d8230be495a21455b751f639

                                                                                      SHA256

                                                                                      be0159bfbd2f955dbf1d08325db19b04e8f73242a5a679c2d6a29408261e929c

                                                                                      SHA512

                                                                                      8d5ab28abe28c2d230167757590e3b61045d6c09c328593f8a579f322e2971b70099196f2bc05be3e55b3975998c7470270e379a9e8617f4d45e8a4efd46d187

                                                                                    • C:\Users\Admin\AppData\Roaming\58DD3\312D.8DD

                                                                                      Filesize

                                                                                      1KB

                                                                                      MD5

                                                                                      577a1663ee91e42af436cfb03b36df99

                                                                                      SHA1

                                                                                      0f0bff88544b8d4c1f7676452f5b382527c852c4

                                                                                      SHA256

                                                                                      18ecd80758bfdb923e6a10662c5a615ab2b367a76f7a4db06c61f98b573ed409

                                                                                      SHA512

                                                                                      7a6f64c29a458584c952845837a32d00185a1535a2fa04b3ca6bbcf393fb9670c703619f8b80abd3666e3631750c5af40c6b8a3f82b522456dc247dbabd5d792

                                                                                    • C:\Users\Admin\AppData\Roaming\58DD3\312D.8DD

                                                                                      Filesize

                                                                                      600B

                                                                                      MD5

                                                                                      11bbd28747b2d43277885b8cd99b6fbd

                                                                                      SHA1

                                                                                      4b033c7ab885434b4cc75f0d55646d2304d9a46f

                                                                                      SHA256

                                                                                      fa81f5c83056d9d6f90d48476e2826aa2fb115259e44f492b95491181613b122

                                                                                      SHA512

                                                                                      3b6c37ba8b60502f723f5cddad06f1588efdc1f0aaaba32221ac93adfd259fc30f772b0b5b6c44ead37470e41e0a00305699d3d8344f0332101c0fbfac65ff38

                                                                                    • C:\Users\Admin\AppData\Roaming\58DD3\312D.8DD

                                                                                      Filesize

                                                                                      996B

                                                                                      MD5

                                                                                      a9796b0782fa906f1d1f8b55b7370462

                                                                                      SHA1

                                                                                      d3c8335b50e930da513509e7cb30df94bf45dc86

                                                                                      SHA256

                                                                                      1a77d3b6b885feeb8ccbdd5291f528a35043e566d8db3020133acc9fbeaede24

                                                                                      SHA512

                                                                                      f47e931d99d0c40ed97a59ff28af4bd28e8716eadf5c5def4ffacdb990e4ca0296640956db624b494a830b482a53a0a3b9abbdf2e3444ec4ad56cd4012e9ccb7

                                                                                    • memory/388-1365-0x000001E62AC00000-0x000001E62AD00000-memory.dmp

                                                                                      Filesize

                                                                                      1024KB

                                                                                    • memory/436-925-0x0000000004AB0000-0x0000000004AB1000-memory.dmp

                                                                                      Filesize

                                                                                      4KB

                                                                                    • memory/1296-1237-0x0000023EF0C50000-0x0000023EF0C70000-memory.dmp

                                                                                      Filesize

                                                                                      128KB

                                                                                    • memory/1296-77-0x0000000000400000-0x0000000000469000-memory.dmp

                                                                                      Filesize

                                                                                      420KB

                                                                                    • memory/1296-1259-0x0000023EF1260000-0x0000023EF1280000-memory.dmp

                                                                                      Filesize

                                                                                      128KB

                                                                                    • memory/1296-1228-0x0000023EF0C90000-0x0000023EF0CB0000-memory.dmp

                                                                                      Filesize

                                                                                      128KB

                                                                                    • memory/1412-499-0x000002B5FB220000-0x000002B5FB320000-memory.dmp

                                                                                      Filesize

                                                                                      1024KB

                                                                                    • memory/1412-524-0x000002B5FC750000-0x000002B5FC770000-memory.dmp

                                                                                      Filesize

                                                                                      128KB

                                                                                    • memory/1412-514-0x000002B5FC340000-0x000002B5FC360000-memory.dmp

                                                                                      Filesize

                                                                                      128KB

                                                                                    • memory/1412-497-0x000002B5FB220000-0x000002B5FB320000-memory.dmp

                                                                                      Filesize

                                                                                      1024KB

                                                                                    • memory/1412-502-0x000002B5FC380000-0x000002B5FC3A0000-memory.dmp

                                                                                      Filesize

                                                                                      128KB

                                                                                    • memory/1748-1067-0x00000000047E0000-0x00000000047E1000-memory.dmp

                                                                                      Filesize

                                                                                      4KB

                                                                                    • memory/2632-368-0x00000139743A0000-0x00000139743C0000-memory.dmp

                                                                                      Filesize

                                                                                      128KB

                                                                                    • memory/2632-352-0x0000013973500000-0x0000013973600000-memory.dmp

                                                                                      Filesize

                                                                                      1024KB

                                                                                    • memory/2632-353-0x0000013973500000-0x0000013973600000-memory.dmp

                                                                                      Filesize

                                                                                      1024KB

                                                                                    • memory/2632-351-0x0000013973500000-0x0000013973600000-memory.dmp

                                                                                      Filesize

                                                                                      1024KB

                                                                                    • memory/2632-356-0x00000139743E0000-0x0000013974400000-memory.dmp

                                                                                      Filesize

                                                                                      128KB

                                                                                    • memory/2632-379-0x00000139749B0000-0x00000139749D0000-memory.dmp

                                                                                      Filesize

                                                                                      128KB

                                                                                    • memory/2848-158-0x0000000000400000-0x000000000041D000-memory.dmp

                                                                                      Filesize

                                                                                      116KB

                                                                                    • memory/3668-1362-0x00000000034B0000-0x00000000034B1000-memory.dmp

                                                                                      Filesize

                                                                                      4KB

                                                                                    • memory/3716-196-0x0000000003710000-0x0000000003711000-memory.dmp

                                                                                      Filesize

                                                                                      4KB

                                                                                    • memory/3764-199-0x000001EE2AA00000-0x000001EE2AB00000-memory.dmp

                                                                                      Filesize

                                                                                      1024KB

                                                                                    • memory/3764-198-0x000001EE2AA00000-0x000001EE2AB00000-memory.dmp

                                                                                      Filesize

                                                                                      1024KB

                                                                                    • memory/3764-203-0x000001EE2BB60000-0x000001EE2BB80000-memory.dmp

                                                                                      Filesize

                                                                                      128KB

                                                                                    • memory/3764-215-0x000001EE2BB20000-0x000001EE2BB40000-memory.dmp

                                                                                      Filesize

                                                                                      128KB

                                                                                    • memory/3764-234-0x000001EE2BF30000-0x000001EE2BF50000-memory.dmp

                                                                                      Filesize

                                                                                      128KB

                                                                                    • memory/3804-775-0x00000000047B0000-0x00000000047B1000-memory.dmp

                                                                                      Filesize

                                                                                      4KB

                                                                                    • memory/3876-631-0x0000026FA8DA0000-0x0000026FA8DC0000-memory.dmp

                                                                                      Filesize

                                                                                      128KB

                                                                                    • memory/3876-640-0x0000026FA8D60000-0x0000026FA8D80000-memory.dmp

                                                                                      Filesize

                                                                                      128KB

                                                                                    • memory/3876-653-0x0000026FA9170000-0x0000026FA9190000-memory.dmp

                                                                                      Filesize

                                                                                      128KB

                                                                                    • memory/4052-926-0x000001866C240000-0x000001866C340000-memory.dmp

                                                                                      Filesize

                                                                                      1024KB

                                                                                    • memory/4052-931-0x000001866D190000-0x000001866D1B0000-memory.dmp

                                                                                      Filesize

                                                                                      128KB

                                                                                    • memory/4052-963-0x000001866D760000-0x000001866D780000-memory.dmp

                                                                                      Filesize

                                                                                      128KB

                                                                                    • memory/4052-941-0x000001866D150000-0x000001866D170000-memory.dmp

                                                                                      Filesize

                                                                                      128KB

                                                                                    • memory/4288-1220-0x0000000004D50000-0x0000000004D51000-memory.dmp

                                                                                      Filesize

                                                                                      4KB

                                                                                    • memory/4416-349-0x00000000042F0000-0x00000000042F1000-memory.dmp

                                                                                      Filesize

                                                                                      4KB

                                                                                    • memory/4484-495-0x0000000003730000-0x0000000003731000-memory.dmp

                                                                                      Filesize

                                                                                      4KB

                                                                                    • memory/4492-14-0x0000000000400000-0x0000000000469000-memory.dmp

                                                                                      Filesize

                                                                                      420KB

                                                                                    • memory/4492-13-0x0000000000400000-0x0000000000469000-memory.dmp

                                                                                      Filesize

                                                                                      420KB

                                                                                    • memory/4492-12-0x0000000000400000-0x0000000000469000-memory.dmp

                                                                                      Filesize

                                                                                      420KB

                                                                                    • memory/4540-1219-0x0000000000400000-0x0000000000469000-memory.dmp

                                                                                      Filesize

                                                                                      420KB

                                                                                    • memory/4540-1-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                      Filesize

                                                                                      408KB

                                                                                    • memory/4540-78-0x0000000000400000-0x0000000000469000-memory.dmp

                                                                                      Filesize

                                                                                      420KB

                                                                                    • memory/4540-16-0x0000000000400000-0x0000000000469000-memory.dmp

                                                                                      Filesize

                                                                                      420KB

                                                                                    • memory/4540-15-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                      Filesize

                                                                                      408KB

                                                                                    • memory/4540-2-0x0000000000400000-0x0000000000469000-memory.dmp

                                                                                      Filesize

                                                                                      420KB

                                                                                    • memory/4540-347-0x0000000000400000-0x0000000000469000-memory.dmp

                                                                                      Filesize

                                                                                      420KB

                                                                                    • memory/4576-623-0x0000000004E80000-0x0000000004E81000-memory.dmp

                                                                                      Filesize

                                                                                      4KB

                                                                                    • memory/5064-792-0x000001ECE9F40000-0x000001ECE9F60000-memory.dmp

                                                                                      Filesize

                                                                                      128KB

                                                                                    • memory/5064-1095-0x0000026BD2DE0000-0x0000026BD2E00000-memory.dmp

                                                                                      Filesize

                                                                                      128KB

                                                                                    • memory/5064-1084-0x0000026BD27D0000-0x0000026BD27F0000-memory.dmp

                                                                                      Filesize

                                                                                      128KB

                                                                                    • memory/5064-1071-0x0000026BD1900000-0x0000026BD1A00000-memory.dmp

                                                                                      Filesize

                                                                                      1024KB

                                                                                    • memory/5064-1074-0x0000026BD2A20000-0x0000026BD2A40000-memory.dmp

                                                                                      Filesize

                                                                                      128KB

                                                                                    • memory/5064-1070-0x0000026BD1900000-0x0000026BD1A00000-memory.dmp

                                                                                      Filesize

                                                                                      1024KB

                                                                                    • memory/5064-1069-0x0000026BD1900000-0x0000026BD1A00000-memory.dmp

                                                                                      Filesize

                                                                                      1024KB

                                                                                    • memory/5064-804-0x000001ECEA350000-0x000001ECEA370000-memory.dmp

                                                                                      Filesize

                                                                                      128KB

                                                                                    • memory/5064-778-0x000001ECE8E20000-0x000001ECE8F20000-memory.dmp

                                                                                      Filesize

                                                                                      1024KB

                                                                                    • memory/5064-782-0x000001ECE9F80000-0x000001ECE9FA0000-memory.dmp

                                                                                      Filesize

                                                                                      128KB