Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 20:14
Static task
static1
Behavioral task
behavioral1
Sample
41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe
-
Size
382KB
-
MD5
41dd108ada487cb93a6e099e074f605b
-
SHA1
354f9fcee3214078d2bc5e3ea55c6b678c2fe2bf
-
SHA256
aebce4939ad8d8df9d1807debb140669e47a24c71b7978249362d3b0900c33f3
-
SHA512
33adb352e06e779871224ce094954756f15e49785fc14f8c8a02476b420b00907961d3489944c2da42fa84e8185f0f6bc7eefde58ebc4ae213fed9bfa1b5932b
-
SSDEEP
6144:n0Ly6qr9+br6u1yvZgQHhEaBTuPwyQ9Hmdy1MsZ:nxF9FZhH+aBaPUGY1M+
Malware Config
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.html
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.txt
cerber
http://4kqd3hmqgptupi3p.wins4n.win/3C75-61BA-EE78-0078-12AC
http://4kqd3hmqgptupi3p.we34re.top/3C75-61BA-EE78-0078-12AC
http://4kqd3hmqgptupi3p.5kti58.top/3C75-61BA-EE78-0078-12AC
http://4kqd3hmqgptupi3p.vmckfi.top/3C75-61BA-EE78-0078-12AC
http://4kqd3hmqgptupi3p.onion.to/3C75-61BA-EE78-0078-12AC
http://4kqd3hmqgptupi3p.onion/3C75-61BA-EE78-0078-12AC
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16398) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B965DA44-BA2B-5232-B6E1-2553B5BB2851}\\tar.exe\"" 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B965DA44-BA2B-5232-B6E1-2553B5BB2851}\\tar.exe\"" tar.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation tar.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\tar.lnk 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\tar.lnk tar.exe -
Executes dropped EXE 3 IoCs
pid Process 1016 tar.exe 4996 tar.exe 3980 tar.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tar = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B965DA44-BA2B-5232-B6E1-2553B5BB2851}\\tar.exe\"" 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\tar = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B965DA44-BA2B-5232-B6E1-2553B5BB2851}\\tar.exe\"" 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tar = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B965DA44-BA2B-5232-B6E1-2553B5BB2851}\\tar.exe\"" tar.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\tar = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B965DA44-BA2B-5232-B6E1-2553B5BB2851}\\tar.exe\"" tar.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp38AA.bmp" tar.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4892 cmd.exe 2268 PING.EXE 5024 cmd.exe 1588 PING.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 1896 taskkill.exe 3480 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B965DA44-BA2B-5232-B6E1-2553B5BB2851}\\tar.exe\"" tar.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B965DA44-BA2B-5232-B6E1-2553B5BB2851}\\tar.exe\"" 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop tar.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings tar.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2268 PING.EXE 1588 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe 1016 tar.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 3880 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe Token: SeDebugPrivilege 1896 taskkill.exe Token: SeDebugPrivilege 1016 tar.exe Token: SeDebugPrivilege 4996 tar.exe Token: 33 3204 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3204 AUDIODG.EXE Token: SeDebugPrivilege 3980 tar.exe Token: SeDebugPrivilege 3480 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3880 wrote to memory of 1016 3880 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe 86 PID 3880 wrote to memory of 1016 3880 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe 86 PID 3880 wrote to memory of 1016 3880 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe 86 PID 3880 wrote to memory of 4892 3880 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe 87 PID 3880 wrote to memory of 4892 3880 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe 87 PID 3880 wrote to memory of 4892 3880 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe 87 PID 4892 wrote to memory of 1896 4892 cmd.exe 89 PID 4892 wrote to memory of 1896 4892 cmd.exe 89 PID 4892 wrote to memory of 1896 4892 cmd.exe 89 PID 4892 wrote to memory of 2268 4892 cmd.exe 91 PID 4892 wrote to memory of 2268 4892 cmd.exe 91 PID 4892 wrote to memory of 2268 4892 cmd.exe 91 PID 1016 wrote to memory of 4900 1016 tar.exe 98 PID 1016 wrote to memory of 4900 1016 tar.exe 98 PID 4900 wrote to memory of 3312 4900 msedge.exe 99 PID 4900 wrote to memory of 3312 4900 msedge.exe 99 PID 1016 wrote to memory of 2004 1016 tar.exe 100 PID 1016 wrote to memory of 2004 1016 tar.exe 100 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 2756 4900 msedge.exe 101 PID 4900 wrote to memory of 996 4900 msedge.exe 102 PID 4900 wrote to memory of 996 4900 msedge.exe 102 PID 4900 wrote to memory of 1744 4900 msedge.exe 103 PID 4900 wrote to memory of 1744 4900 msedge.exe 103 PID 4900 wrote to memory of 1744 4900 msedge.exe 103 PID 4900 wrote to memory of 1744 4900 msedge.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\AppData\Roaming\{B965DA44-BA2B-5232-B6E1-2553B5BB2851}\tar.exe"C:\Users\Admin\AppData\Roaming\{B965DA44-BA2B-5232-B6E1-2553B5BB2851}\tar.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xd8,0x110,0x7ffcc76546f8,0x7ffcc7654708,0x7ffcc76547184⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,9193149428985915871,14040369804703925984,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:24⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,9193149428985915871,14040369804703925984,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:34⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,9193149428985915871,14040369804703925984,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2516 /prefetch:84⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9193149428985915871,14040369804703925984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:14⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9193149428985915871,14040369804703925984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:14⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9193149428985915871,14040369804703925984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:14⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9193149428985915871,14040369804703925984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4352 /prefetch:14⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9193149428985915871,14040369804703925984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3948 /prefetch:14⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,9193149428985915871,14040369804703925984,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4460 /prefetch:84⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,9193149428985915871,14040369804703925984,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4460 /prefetch:84⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9193149428985915871,14040369804703925984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:14⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9193149428985915871,14040369804703925984,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:14⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9193149428985915871,14040369804703925984,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4380 /prefetch:14⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9193149428985915871,14040369804703925984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:14⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9193149428985915871,14040369804703925984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4284 /prefetch:14⤵PID:4272
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://4kqd3hmqgptupi3p.wins4n.win/3C75-61BA-EE78-0078-12AC3⤵PID:2072
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc76546f8,0x7ffcc7654708,0x7ffcc76547184⤵PID:4416
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:3788
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "tar.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{B965DA44-BA2B-5232-B6E1-2553B5BB2851}\tar.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5024 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "tar.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3480
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1588
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe" > NUL2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1896
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2268
-
-
-
C:\Users\Admin\AppData\Roaming\{B965DA44-BA2B-5232-B6E1-2553B5BB2851}\tar.exeC:\Users\Admin\AppData\Roaming\{B965DA44-BA2B-5232-B6E1-2553B5BB2851}\tar.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4476
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2164
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x50c 0x5081⤵
- Suspicious use of AdjustPrivilegeToken
PID:3204
-
C:\Users\Admin\AppData\Roaming\{B965DA44-BA2B-5232-B6E1-2553B5BB2851}\tar.exeC:\Users\Admin\AppData\Roaming\{B965DA44-BA2B-5232-B6E1-2553B5BB2851}\tar.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3980
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
2Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD547b6b808aa683211729c59250dce9e4d
SHA13ea4ed062dbb2b35351fa64664fbe0e66c845cb2
SHA256b62cd2389a4321d4f0aa7bfd6b24836fc6a3fde594ede587925cb7019f78e508
SHA51238c4c35b927918f6a78a17be7220aac00218aa62d92525160b2e2877e5822e8543e96effb376b71ef5a06e3a0a8782ff49595f5181ff7f04e8c30df0c9528f5e
-
Filesize
10KB
MD58cfbafbd996ff050b03bcd19bf398b59
SHA167a45c639d8f7c0b84e3dd59e8fc556dba630706
SHA256233831ea6f172f1815dfc5dbe5260425a946bf3dd0143ff95cbd4ca65b1d8947
SHA512a5120c8cda81596e2927c1a3351c8685ef713032e5f909eaee768d66cbca6731183d99306830ff1f4b15ce725fbf2607108b6a71acce5a8cd968ca5a6ad727eb
-
Filesize
85B
MD505dad9de76b046cb80528c554e885845
SHA1e47d152b7df1b5529af0cbad56e1b0156a3dcb7e
SHA25609555ee0954740def996487243d68225ed1f13d93b63197cc3de25f5f5731497
SHA512e9dfa26b495f90a5ebd75f85f45f10b46f110792015fcaa31a043da9cc07513167bb26a81646e1730ad01a97f5cc74aea2f915ced91003c4facc06224a2cf717
-
Filesize
231B
MD59d8c4bfbd009c4d6001e2125abaa8b02
SHA1cd040558172b5fca5b200447a281843956243741
SHA256a652297987f14317100f8c5f7eb26d1bc67eb8a64f0b39b72b5fd5046a9f29b0
SHA512c4c84f43642b805a105acce9ebc9f01aa0e6ef553ea32be3f8b890fc7440f0b7d3ddf99b9336bce20ce7a3d9b9f6434a704651a8af425ffc8407ba39d5de735f
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
6KB
MD5dfba0157871654581dd4f478c4f51c07
SHA105f3748cc85609cd1b9138725333081082551d3c
SHA256243a06f4c9d886074653ab62cbf9c095ffccc22fa2468b804eca66796a1f22c3
SHA51271f7e90907db92b86d3493f582e67a655c8adf5925c09d047b31937b3ad291ceef5df446e13cbabc2e54be6c0aa4c8fc15081474662e79c2e756d8f9d75076dc
-
Filesize
6KB
MD53be1938bc3b2a00bb00a9e6fbc4d2b87
SHA149d66ee555a35c552836afa51e9d5c2a64818450
SHA2568a623b06095676a5f45c183325502f471612d7c41d007360493005c06b929d51
SHA51271a6dffdc171c1e8b04ef9bfbe793b193b8084fbdd628222d42370aeec8edef04b8107ff14fa68d7f39a9c93d1abf45ac1cdbc71b0fa6cb37b38ebd947c340a7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD518b5757094c0356ab55cbb23690c8bc2
SHA13e192f31e034818101f8d25fcdf611d9a2272ef9
SHA2567523da10dc3904240bc95b3b76c6401dd9e00c3498109c97d89e20115a38d2c8
SHA51267910ac15a1eaa06ae777b697a36802dc985731548d675d107f5dd0058b28e9b62e7462f637e6f577884f5cc3c629fb0ab2efb25b4b70a6fa845469ecc832be0
-
Filesize
1KB
MD51c60f417e59de1d76c345cb7f60f268f
SHA156221cb962875d05951f45e4db616fc2c9914b59
SHA256e163c656f9a38db2a7b9fd061bc05a0ecfd2ac34e571827e7998c3a74cd687a9
SHA51202416b810ce19bbed324c531f475fd9894feaf08bb9f6f5fd586b9f5a68da2f9bff7c68d051911c0e27d975f9c1456396cbd68662a032219a77d0cc8dac53735
-
Filesize
382KB
MD541dd108ada487cb93a6e099e074f605b
SHA1354f9fcee3214078d2bc5e3ea55c6b678c2fe2bf
SHA256aebce4939ad8d8df9d1807debb140669e47a24c71b7978249362d3b0900c33f3
SHA51233adb352e06e779871224ce094954756f15e49785fc14f8c8a02476b420b00907961d3489944c2da42fa84e8185f0f6bc7eefde58ebc4ae213fed9bfa1b5932b