Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 04:48
Static task
static1
Behavioral task
behavioral1
Sample
046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe
-
Size
710KB
-
MD5
046c31b39dfd7efa5529d967d9da0cd2
-
SHA1
a8dcf135677807e411fe238ca3cdb161904f0615
-
SHA256
d01a5d62bb91753fb9ebc8a48b6f1a2aa77af57a53500443e70c98d551f97cbe
-
SHA512
c11c66492e6d20c589bfd41d904782c9a7c9fcd38461e5c7f053cb3d9f4eacacf386eeef1c6b914307c5ef630db5e3a3e8c4ba44bf9711549fbc388334fccc5b
-
SSDEEP
3072:Pk8kRENOocTpQ32pBHfaCIBHK5GkMeW7SX:M84ENO19Q32r5IBqGkQ7M
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.azlto5.win/CF08-100E-3D42-0063-7358
http://cerberhhyed5frqa.xzcfr4.win/CF08-100E-3D42-0063-7358
http://cerberhhyed5frqa.asxce4.win/CF08-100E-3D42-0063-7358
http://cerberhhyed5frqa.45kgok.win/CF08-100E-3D42-0063-7358
http://cerberhhyed5frqa.ad34ft.win/CF08-100E-3D42-0063-7358
http://cerberhhyed5frqa.onion/CF08-100E-3D42-0063-7358
Extracted
C:\Users\Admin\AppData\Roaming\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16397) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\\edpnotify.exe\"" 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\\edpnotify.exe\"" edpnotify.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation edpnotify.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\edpnotify.lnk 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\edpnotify.lnk edpnotify.exe -
Executes dropped EXE 1 IoCs
pid Process 1388 edpnotify.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\edpnotify = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\\edpnotify.exe\"" 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\edpnotify = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\\edpnotify.exe\"" edpnotify.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\edpnotify = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\\edpnotify.exe\"" edpnotify.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\edpnotify = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\\edpnotify.exe\"" 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edpnotify.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1332 cmd.exe 3964 PING.EXE 916 cmd.exe 4080 PING.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3540 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 2456 taskkill.exe 1724 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\\edpnotify.exe\"" 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\Desktop edpnotify.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\\edpnotify.exe\"" edpnotify.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\Desktop 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings edpnotify.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 3964 PING.EXE 4080 PING.EXE -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 1388 edpnotify.exe 2236 msedge.exe 2236 msedge.exe 2804 msedge.exe 2804 msedge.exe 1132 identity_helper.exe 1132 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 4228 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe Token: SeDebugPrivilege 1388 edpnotify.exe Token: SeDebugPrivilege 2456 taskkill.exe Token: SeBackupPrivilege 4240 vssvc.exe Token: SeRestorePrivilege 4240 vssvc.exe Token: SeAuditPrivilege 4240 vssvc.exe Token: SeIncreaseQuotaPrivilege 3568 wmic.exe Token: SeSecurityPrivilege 3568 wmic.exe Token: SeTakeOwnershipPrivilege 3568 wmic.exe Token: SeLoadDriverPrivilege 3568 wmic.exe Token: SeSystemProfilePrivilege 3568 wmic.exe Token: SeSystemtimePrivilege 3568 wmic.exe Token: SeProfSingleProcessPrivilege 3568 wmic.exe Token: SeIncBasePriorityPrivilege 3568 wmic.exe Token: SeCreatePagefilePrivilege 3568 wmic.exe Token: SeBackupPrivilege 3568 wmic.exe Token: SeRestorePrivilege 3568 wmic.exe Token: SeShutdownPrivilege 3568 wmic.exe Token: SeDebugPrivilege 3568 wmic.exe Token: SeSystemEnvironmentPrivilege 3568 wmic.exe Token: SeRemoteShutdownPrivilege 3568 wmic.exe Token: SeUndockPrivilege 3568 wmic.exe Token: SeManageVolumePrivilege 3568 wmic.exe Token: 33 3568 wmic.exe Token: 34 3568 wmic.exe Token: 35 3568 wmic.exe Token: 36 3568 wmic.exe Token: SeIncreaseQuotaPrivilege 3568 wmic.exe Token: SeSecurityPrivilege 3568 wmic.exe Token: SeTakeOwnershipPrivilege 3568 wmic.exe Token: SeLoadDriverPrivilege 3568 wmic.exe Token: SeSystemProfilePrivilege 3568 wmic.exe Token: SeSystemtimePrivilege 3568 wmic.exe Token: SeProfSingleProcessPrivilege 3568 wmic.exe Token: SeIncBasePriorityPrivilege 3568 wmic.exe Token: SeCreatePagefilePrivilege 3568 wmic.exe Token: SeBackupPrivilege 3568 wmic.exe Token: SeRestorePrivilege 3568 wmic.exe Token: SeShutdownPrivilege 3568 wmic.exe Token: SeDebugPrivilege 3568 wmic.exe Token: SeSystemEnvironmentPrivilege 3568 wmic.exe Token: SeRemoteShutdownPrivilege 3568 wmic.exe Token: SeUndockPrivilege 3568 wmic.exe Token: SeManageVolumePrivilege 3568 wmic.exe Token: 33 3568 wmic.exe Token: 34 3568 wmic.exe Token: 35 3568 wmic.exe Token: 36 3568 wmic.exe Token: 33 3020 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3020 AUDIODG.EXE Token: SeDebugPrivilege 1724 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4228 wrote to memory of 1388 4228 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe 82 PID 4228 wrote to memory of 1388 4228 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe 82 PID 4228 wrote to memory of 1388 4228 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe 82 PID 4228 wrote to memory of 1332 4228 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe 83 PID 4228 wrote to memory of 1332 4228 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe 83 PID 4228 wrote to memory of 1332 4228 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe 83 PID 1332 wrote to memory of 2456 1332 cmd.exe 85 PID 1332 wrote to memory of 2456 1332 cmd.exe 85 PID 1332 wrote to memory of 2456 1332 cmd.exe 85 PID 1388 wrote to memory of 3540 1388 edpnotify.exe 87 PID 1388 wrote to memory of 3540 1388 edpnotify.exe 87 PID 1332 wrote to memory of 3964 1332 cmd.exe 89 PID 1332 wrote to memory of 3964 1332 cmd.exe 89 PID 1332 wrote to memory of 3964 1332 cmd.exe 89 PID 1388 wrote to memory of 3568 1388 edpnotify.exe 92 PID 1388 wrote to memory of 3568 1388 edpnotify.exe 92 PID 1388 wrote to memory of 2804 1388 edpnotify.exe 102 PID 1388 wrote to memory of 2804 1388 edpnotify.exe 102 PID 2804 wrote to memory of 2188 2804 msedge.exe 103 PID 2804 wrote to memory of 2188 2804 msedge.exe 103 PID 1388 wrote to memory of 936 1388 edpnotify.exe 104 PID 1388 wrote to memory of 936 1388 edpnotify.exe 104 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 1592 2804 msedge.exe 106 PID 2804 wrote to memory of 2236 2804 msedge.exe 107 PID 2804 wrote to memory of 2236 2804 msedge.exe 107 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Roaming\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\edpnotify.exe"C:\Users\Admin\AppData\Roaming\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\edpnotify.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3540
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff97a3346f8,0x7ff97a334708,0x7ff97a3347184⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2264,4494512066611039600,1023532602201028558,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2276 /prefetch:24⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2264,4494512066611039600,1023532602201028558,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2264,4494512066611039600,1023532602201028558,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:84⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,4494512066611039600,1023532602201028558,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:14⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,4494512066611039600,1023532602201028558,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:14⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,4494512066611039600,1023532602201028558,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3128 /prefetch:14⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,4494512066611039600,1023532602201028558,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4264 /prefetch:14⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,4494512066611039600,1023532602201028558,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:14⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2264,4494512066611039600,1023532602201028558,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4340 /prefetch:84⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2264,4494512066611039600,1023532602201028558,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4340 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,4494512066611039600,1023532602201028558,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:14⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,4494512066611039600,1023532602201028558,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:14⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,4494512066611039600,1023532602201028558,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:14⤵PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,4494512066611039600,1023532602201028558,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:14⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,4494512066611039600,1023532602201028558,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3064 /prefetch:14⤵PID:2196
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.azlto5.win/CF08-100E-3D42-0063-73583⤵PID:4396
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff97a3346f8,0x7ff97a334708,0x7ff97a3347184⤵PID:5012
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:3836
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "edpnotify.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\edpnotify.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:916 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "edpnotify.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4080
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe" > NUL2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3964
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4240
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:388
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4676
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x310 0x4941⤵
- Suspicious use of AdjustPrivilegeToken
PID:3020
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
2Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
6KB
MD560208bd38f1e30d4c17dc7957d87bc28
SHA105fd765b9b127b0cfd255124e1c7644bb4e4365f
SHA256304fb0345fce96e514fa957b0a6ae1978ad23978001fd6e944353074ac74afef
SHA5122aa160e5e1539b5890af077221c6d3c7ece5b0ab45aebc9d32a41ea91dbeb376fba66f6782edf0a46e2644aaa54d5f26fb6fa025ec0b5f8edfb3c006bfe18034
-
Filesize
5KB
MD5a0dab289b5bc317b61f155218717b0a0
SHA13ad612cbe1fabd1c54779e0afece56f05be6e2e7
SHA256e0a677b23f73484aa4d72547a3509d0771b5a12490df5b13c37f8d823c8c3a10
SHA51234b83f39d9181e976e28f24929014975f04cb0e7102f2cf447906040add5afa3c0c1619a97a85b597312c70528f2b7554a192252151e8e0aaedb39f3d7d06ead
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5bdfd7b467cf485ec6d5903bc0c9cf0ef
SHA10a5999e85d54a5636d361e8d1500479e3ca6b995
SHA256024bacf8308b142f21cb0cace0dd3c974737223fe4f354590249d0ffc3abdc99
SHA512f2bed6bffc04d3143e9c515591764ddb19062d6a4dd660a8e751b9712f600a5a8a563ee32b4a80f409ef0deb941610c9a616b20a2811e6c982224371a3e29095
-
Filesize
12KB
MD5fee1cdd4a3c5c67593aca6dba38557d4
SHA18f94ff368655a418a05ea6dfcf5b62c7c6c82352
SHA256543e2bfe10ca572bced3949fe5ceb93738f82d09809853afa36b28e05568fbf7
SHA5129976240da49282e2500d7ebd209bd97669a2b2e58a6d85fea829a340b0620a7d138e62a9f2be6504a2d0a449bc6e083f19deff0ef9852244010757bae6f15c51
-
Filesize
10KB
MD5e2219afc9bf24efbe06415653003b0d6
SHA1f3e636da36bc6d6013f73713acfc04d2ab14797e
SHA256334e5bdadeb7713ac67cf57d896b106eefcfbd4a5e48cec34bf442bb5eb1e074
SHA5124172a59774960d5e7cc740b398de160c2138e34cc3a589ccc219882fafc0fcd53d8240f674ef5ebb7aa6e136d23248ac3e360814372dce172e54655ab19b9339
-
Filesize
85B
MD53235a086bce077c8aa170ab2b75198d6
SHA1ba6aae49bc577af1a08d94a35b8f238ce3973625
SHA256e0103347e7e8ae2f60b7974b56dc97355f0dd27d0a0748dbdf19358de034c441
SHA5126bb2d484bd6ebb0100f66db77e8962d734c1987c2da5753bf0a63c7bfa11bfa1dfd369af7d311debd7aacca40f7d25a5571851b812ae7a3979b0c82ed87a216d
-
Filesize
216B
MD548ac29422570636cae371b68c858b988
SHA1ff86dea198c93a8ae49ee52c6eb919fcbd259aab
SHA2563926b08f205999c2f1a24121117ecfeed31557bf6f0529416f3432321292c6b0
SHA51275019e6fd4b53528aab1af668149540e1bc372e58e4786eda1da75e7c9718dbc274cbf3f37cd38fbe7e618ea9c1b24c2534d18aecfcc3264ec55f83f206faaa3
-
Filesize
1KB
MD53b9fa2b93c0ba5e7127d4c3be80e2b49
SHA19edd4e8f4ebc1e99387036511303b3a1919599c8
SHA25652cf6e8410565662f9ac758ae11ec3cd7b4d4fe21b56277fde8296b66b5871cf
SHA512c49b94bd7c9b1e7abafe4f9cfe7261152d28a5ba32ecd0b6d99e8b1ea2f2ead33bd778ec4d3be310f10b5f57a97e4077a9e609853832786527f67f20e2bfe7af
-
Filesize
710KB
MD5046c31b39dfd7efa5529d967d9da0cd2
SHA1a8dcf135677807e411fe238ca3cdb161904f0615
SHA256d01a5d62bb91753fb9ebc8a48b6f1a2aa77af57a53500443e70c98d551f97cbe
SHA512c11c66492e6d20c589bfd41d904782c9a7c9fcd38461e5c7f053cb3d9f4eacacf386eeef1c6b914307c5ef630db5e3a3e8c4ba44bf9711549fbc388334fccc5b