Analysis
-
max time kernel
93s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 23:23
Behavioral task
behavioral1
Sample
26fedfe9ca4855a8bbdd4bbc61fe06e6_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
26fedfe9ca4855a8bbdd4bbc61fe06e6_JaffaCakes118.exe
-
Size
32KB
-
MD5
26fedfe9ca4855a8bbdd4bbc61fe06e6
-
SHA1
c695bc1d78b5bbd27d61650643b9402667b12023
-
SHA256
e823f12c245a82a9c421678f960d9590ef8ac2de786442c966fd829a5e1a2152
-
SHA512
53fc529a0058bb87b666d7e91e96b1745f42137f9a9afee668ae2389cb73e97578d8b5090948d1e4c77efd796af6d48072d14ddadd0f1d45757ec9c9e3030954
-
SSDEEP
768:OIMGlhBxtzSlG3XV2scACW3TftY3lf93LS36HMZT:OgTB+lmV22j3i/S6HMB
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000f000000023b8c-9.dat acprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 26fedfe9ca4855a8bbdd4bbc61fe06e6_JaffaCakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 4472 IEXPLORE.EXE 4472 IEXPLORE.EXE -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{CDCB9C80-B861-4A87-B41A-6257D7F46489} 26fedfe9ca4855a8bbdd4bbc61fe06e6_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\KBDROSTd.DLL 26fedfe9ca4855a8bbdd4bbc61fe06e6_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4964-0-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/4964-1-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/files/0x000f000000023b8c-9.dat upx behavioral2/memory/4964-44-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26fedfe9ca4855a8bbdd4bbc61fe06e6_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31136273" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a43d217a0cb97a4db769f976d8642e39000000000200000000001066000000010000200000003a422a14cd48e8ae0779898155317b9a8f13c73a4e3953afbfeea181767a40f8000000000e80000000020000200000001cc395041154fbc16c24c89340d36adeb05fa79f7dfdc01059c5dc43c13b150820000000ebd5ed918b9415c68ec0f5abe6ef6caa53d12de85467b6ab68660bbbf171fb3240000000466a8317243cbe3c8f264d1857d841ec2b4ef2ce3e23f8b22b7250a0cb5e35564378c8979f3fd9af05c5f0350047832c7a9168a247f70d50504f2f5fc2c7fbe4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1897975266" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31136273" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a43d217a0cb97a4db769f976d8642e3900000000020000000000106600000001000020000000542ca91a0f2b2fef65c4f82391376522ec6ff8ae7fc012e074ba5cc4801483a6000000000e800000000200002000000037e5e341a83f0ba5278ef08ca2f1b73b75654db63047effe3bf48520d073915220000000b875fe34410e3413c9cdb7fe9afb7f5f0c0f51bd87455d2d23ad714bb27267f640000000bdd2e8a6825b12089d2044fbcf4fe7a38610f4c94a1b8f281af444c8b8c1e464221aa0a59852e36a2c07f22fe3ff94d4f69c61aef760ebd2098f8b3874edea76 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c00000000000000010000000083ffff0083ffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0ed9771111adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main 26fedfe9ca4855a8bbdd4bbc61fe06e6_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Enable Browser Extensions = "yes" 26fedfe9ca4855a8bbdd4bbc61fe06e6_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1898756087" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90d4a371111adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435218958" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\MAO Settings iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\DiscardLoadTimes = 9c5ac702d418db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WebPrefix = "25679 - winrar" 26fedfe9ca4855a8bbdd4bbc61fe06e6_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1897975266" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main 26fedfe9ca4855a8bbdd4bbc61fe06e6_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{9CB1A0DF-8604-11EF-ADF2-CEB9D96D8528} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1898756087" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31136273" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Offline Folder = "8F113D3E-DF81-4A7A-9469-0CD88DFBA2B5" 26fedfe9ca4855a8bbdd4bbc61fe06e6_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31136273" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CDCB9C80-B861-4A87-B41A-6257D7F46489}\InprocServer32 26fedfe9ca4855a8bbdd4bbc61fe06e6_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 26fedfe9ca4855a8bbdd4bbc61fe06e6_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 26fedfe9ca4855a8bbdd4bbc61fe06e6_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CDCB9C80-B861-4A87-B41A-6257D7F46489} 26fedfe9ca4855a8bbdd4bbc61fe06e6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CDCB9C80-B861-4A87-B41A-6257D7F46489}\InprocServer32\ = "C:\\Windows\\SysWow64\\KBDROSTd.DLL" 26fedfe9ca4855a8bbdd4bbc61fe06e6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CDCB9C80-B861-4A87-B41A-6257D7F46489}\InprocServer32\ThreadingModel = "Apartment" 26fedfe9ca4855a8bbdd4bbc61fe06e6_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 928 msedge.exe 928 msedge.exe 3524 msedge.exe 3524 msedge.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4496 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4496 iexplore.exe 4496 iexplore.exe 4472 IEXPLORE.EXE 4472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4964 wrote to memory of 4496 4964 26fedfe9ca4855a8bbdd4bbc61fe06e6_JaffaCakes118.exe 86 PID 4964 wrote to memory of 4496 4964 26fedfe9ca4855a8bbdd4bbc61fe06e6_JaffaCakes118.exe 86 PID 4496 wrote to memory of 4472 4496 iexplore.exe 88 PID 4496 wrote to memory of 4472 4496 iexplore.exe 88 PID 4496 wrote to memory of 4472 4496 iexplore.exe 88 PID 4472 wrote to memory of 4080 4472 IEXPLORE.EXE 89 PID 4472 wrote to memory of 4080 4472 IEXPLORE.EXE 89 PID 4080 wrote to memory of 928 4080 ie_to_edge_stub.exe 90 PID 4080 wrote to memory of 928 4080 ie_to_edge_stub.exe 90 PID 928 wrote to memory of 1156 928 msedge.exe 91 PID 928 wrote to memory of 1156 928 msedge.exe 91 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 716 928 msedge.exe 92 PID 928 wrote to memory of 3524 928 msedge.exe 93 PID 928 wrote to memory of 3524 928 msedge.exe 93 PID 928 wrote to memory of 2008 928 msedge.exe 94 PID 928 wrote to memory of 2008 928 msedge.exe 94 PID 928 wrote to memory of 2008 928 msedge.exe 94 PID 928 wrote to memory of 2008 928 msedge.exe 94 PID 928 wrote to memory of 2008 928 msedge.exe 94 PID 928 wrote to memory of 2008 928 msedge.exe 94 PID 928 wrote to memory of 2008 928 msedge.exe 94 PID 928 wrote to memory of 2008 928 msedge.exe 94 PID 928 wrote to memory of 2008 928 msedge.exe 94 PID 928 wrote to memory of 2008 928 msedge.exe 94 PID 928 wrote to memory of 2008 928 msedge.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\26fedfe9ca4855a8bbdd4bbc61fe06e6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\26fedfe9ca4855a8bbdd4bbc61fe06e6_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://winrar-download.net/danke.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4496 CREDAT:17410 /prefetch:23⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\ie_to_edge_stub.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\ie_to_edge_stub.exe" --from-ie-to-edge=3 --ie-frame-hwnd=702024⤵
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --from-ie-to-edge=3 --ie-frame-hwnd=702025⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb6b0046f8,0x7ffb6b004708,0x7ffb6b0047186⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2256,7062287265279677679,12781684817354002366,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2268 /prefetch:26⤵PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2256,7062287265279677679,12781684817354002366,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2256,7062287265279677679,12781684817354002366,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2596 /prefetch:86⤵PID:2008
-
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
Filesize
5KB
MD55d6dab1cdc857f97bcba20c6102fa183
SHA14558fd872f68b34bd7506233141aef25ec0a49a9
SHA256300df22052e634e9c370a5bf99cce61db1b18f0191c8f9c8ff37d57b5ccdec26
SHA512cc8cd796f81d5cc03ef7058faa7c6b3659e8e4b412a8df9454c1b622ab0ddf02dde02b901d448499ee0f0e4440f73aaaf163e9dc9af7092f961df464f4389ac0
-
Filesize
5KB
MD513338c684caa8fe574bd9d1fe2d8b27f
SHA13155053a77b57b94d98afb630c9febee37619ab1
SHA256dfb02326d6232b1fb424724ddf4fb52967c337c67735b5c46db921aa943c9192
SHA51225b2b01ac243e1865985f7ad0ec579e2ec7946a0317b4a907d675b1b86b434e4405393f3051885d5fe9ffcf010e243e9fd74b6d6b9b26c4a846fbaae0df3863b
-
Filesize
5KB
MD5725f0bb6b45b10debb0d99b35256c1f3
SHA1c404c97d73cf9f20baabf95e0c28f93328cccced
SHA2567dd646a27f8f44ca180333c55da443cd4a3aad61f8850350a863122a36b9668b
SHA512ae004a1fda8ad333daad0d8ca3beb9013a8c02829cdbc482479b5399892bca1e340502407cb46ff042df9f194e5ea18a6304ad96de85ed864b85b5d2793a7345
-
Filesize
10KB
MD52ff8ffc9d21f96aef26e71957443e933
SHA1cb414c34cc6721af947ec6288c3d95bd2bb2f826
SHA256356fa44428a669bf1e12e05b68cff47552a11e5338ea5eda025931ab7e6be560
SHA512aee3358e39b61eaf6cefb6ecdf88db7bc049272d590531fe5fbf3f6a6d47cfab9940b05571762db0ce74bbdbfabaef9c99689a6b5cf67211ead9ede6b4a4f4e5
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
22KB
MD58d0832e3b2e7e9254af68a54efe47aad
SHA1d1ac656a050402cca86c72c52cc6501580595928
SHA256be856d3a5b9c3d101c1c934b23304bd1986d6857a663081de95faf87023586c2
SHA512a0cea18294c06cc67969d41c766551c80cc89857327729778a72fd50d0e2f9d472c7a13f28716aaa42c131e37abbba470843b8b4abda103f22d141d71298dcfe