Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 20:10
Static task
static1
Behavioral task
behavioral1
Sample
41d87fa0c9244a9a098742155a862e4d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
41d87fa0c9244a9a098742155a862e4d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
41d87fa0c9244a9a098742155a862e4d_JaffaCakes118.exe
-
Size
382KB
-
MD5
41d87fa0c9244a9a098742155a862e4d
-
SHA1
f80f8a9584fd4ec0a3e86f0a4bedd66bf204bcdc
-
SHA256
60767e516dcf017b6a446f383a87afda3ce002292866195bdcffb5c8e9dac0c9
-
SHA512
bed43d92325b572f9a1dde0f6088569679619b50d55f120b67b3db0c5dd3c1db604702881b0f7180f1a66069a9f0e2177b7bbd70af8e88da530563163afbd359
-
SSDEEP
6144:A0Ly6qr9+br6u1yvZgQHhEaBTuPwyQ9Hmdy1MsS:AxF9FZhH+aBaPUGY1Mz
Malware Config
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.txt
cerber
http://4kqd3hmqgptupi3p.xkfi59.top/1C27-2959-DE46-0042-F7C5
http://4kqd3hmqgptupi3p.sdfiso.win/1C27-2959-DE46-0042-F7C5
http://4kqd3hmqgptupi3p.wins4n.win/1C27-2959-DE46-0042-F7C5
http://4kqd3hmqgptupi3p.we34re.top/1C27-2959-DE46-0042-F7C5
http://4kqd3hmqgptupi3p.onion.to/1C27-2959-DE46-0042-F7C5
http://4kqd3hmqgptupi3p.onion/1C27-2959-DE46-0042-F7C5
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16399) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{F970690B-9757-54C3-E1BF-B323E831ED35}\\RMActivate_isv.exe\"" 41d87fa0c9244a9a098742155a862e4d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{F970690B-9757-54C3-E1BF-B323E831ED35}\\RMActivate_isv.exe\"" RMActivate_isv.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation RMActivate_isv.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\RMActivate_isv.lnk 41d87fa0c9244a9a098742155a862e4d_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\RMActivate_isv.lnk RMActivate_isv.exe -
Executes dropped EXE 3 IoCs
pid Process 4220 RMActivate_isv.exe 2192 RMActivate_isv.exe 2508 RMActivate_isv.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RMActivate_isv = "\"C:\\Users\\Admin\\AppData\\Roaming\\{F970690B-9757-54C3-E1BF-B323E831ED35}\\RMActivate_isv.exe\"" 41d87fa0c9244a9a098742155a862e4d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\RMActivate_isv = "\"C:\\Users\\Admin\\AppData\\Roaming\\{F970690B-9757-54C3-E1BF-B323E831ED35}\\RMActivate_isv.exe\"" 41d87fa0c9244a9a098742155a862e4d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RMActivate_isv = "\"C:\\Users\\Admin\\AppData\\Roaming\\{F970690B-9757-54C3-E1BF-B323E831ED35}\\RMActivate_isv.exe\"" RMActivate_isv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\RMActivate_isv = "\"C:\\Users\\Admin\\AppData\\Roaming\\{F970690B-9757-54C3-E1BF-B323E831ED35}\\RMActivate_isv.exe\"" RMActivate_isv.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp1870.bmp" RMActivate_isv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RMActivate_isv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RMActivate_isv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41d87fa0c9244a9a098742155a862e4d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RMActivate_isv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1700 cmd.exe 4112 PING.EXE 2296 cmd.exe 4496 PING.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 2664 taskkill.exe 3136 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\Desktop RMActivate_isv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{F970690B-9757-54C3-E1BF-B323E831ED35}\\RMActivate_isv.exe\"" RMActivate_isv.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\Desktop 41d87fa0c9244a9a098742155a862e4d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{F970690B-9757-54C3-E1BF-B323E831ED35}\\RMActivate_isv.exe\"" 41d87fa0c9244a9a098742155a862e4d_JaffaCakes118.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings RMActivate_isv.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 4112 PING.EXE 4496 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe 4220 RMActivate_isv.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4732 41d87fa0c9244a9a098742155a862e4d_JaffaCakes118.exe Token: SeDebugPrivilege 2664 taskkill.exe Token: SeDebugPrivilege 4220 RMActivate_isv.exe Token: SeDebugPrivilege 2192 RMActivate_isv.exe Token: SeDebugPrivilege 2508 RMActivate_isv.exe Token: 33 3456 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3456 AUDIODG.EXE Token: SeDebugPrivilege 3136 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4732 wrote to memory of 4220 4732 41d87fa0c9244a9a098742155a862e4d_JaffaCakes118.exe 86 PID 4732 wrote to memory of 4220 4732 41d87fa0c9244a9a098742155a862e4d_JaffaCakes118.exe 86 PID 4732 wrote to memory of 4220 4732 41d87fa0c9244a9a098742155a862e4d_JaffaCakes118.exe 86 PID 4732 wrote to memory of 1700 4732 41d87fa0c9244a9a098742155a862e4d_JaffaCakes118.exe 87 PID 4732 wrote to memory of 1700 4732 41d87fa0c9244a9a098742155a862e4d_JaffaCakes118.exe 87 PID 4732 wrote to memory of 1700 4732 41d87fa0c9244a9a098742155a862e4d_JaffaCakes118.exe 87 PID 1700 wrote to memory of 2664 1700 cmd.exe 89 PID 1700 wrote to memory of 2664 1700 cmd.exe 89 PID 1700 wrote to memory of 2664 1700 cmd.exe 89 PID 1700 wrote to memory of 4112 1700 cmd.exe 91 PID 1700 wrote to memory of 4112 1700 cmd.exe 91 PID 1700 wrote to memory of 4112 1700 cmd.exe 91 PID 4220 wrote to memory of 1008 4220 RMActivate_isv.exe 96 PID 4220 wrote to memory of 1008 4220 RMActivate_isv.exe 96 PID 1008 wrote to memory of 3696 1008 msedge.exe 97 PID 1008 wrote to memory of 3696 1008 msedge.exe 97 PID 4220 wrote to memory of 4568 4220 RMActivate_isv.exe 98 PID 4220 wrote to memory of 4568 4220 RMActivate_isv.exe 98 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 3132 1008 msedge.exe 99 PID 1008 wrote to memory of 1168 1008 msedge.exe 100 PID 1008 wrote to memory of 1168 1008 msedge.exe 100 PID 1008 wrote to memory of 2264 1008 msedge.exe 101 PID 1008 wrote to memory of 2264 1008 msedge.exe 101 PID 1008 wrote to memory of 2264 1008 msedge.exe 101 PID 1008 wrote to memory of 2264 1008 msedge.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\41d87fa0c9244a9a098742155a862e4d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\41d87fa0c9244a9a098742155a862e4d_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Roaming\{F970690B-9757-54C3-E1BF-B323E831ED35}\RMActivate_isv.exe"C:\Users\Admin\AppData\Roaming\{F970690B-9757-54C3-E1BF-B323E831ED35}\RMActivate_isv.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc1cde46f8,0x7ffc1cde4708,0x7ffc1cde47184⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,2186662341349554156,12386834433895474628,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:24⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,2186662341349554156,12386834433895474628,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:34⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,2186662341349554156,12386834433895474628,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:84⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2186662341349554156,12386834433895474628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:14⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2186662341349554156,12386834433895474628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:14⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2186662341349554156,12386834433895474628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3984 /prefetch:14⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2186662341349554156,12386834433895474628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:14⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2186662341349554156,12386834433895474628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:14⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,2186662341349554156,12386834433895474628,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4916 /prefetch:84⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,2186662341349554156,12386834433895474628,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4916 /prefetch:84⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2186662341349554156,12386834433895474628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:14⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2186662341349554156,12386834433895474628,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4236 /prefetch:14⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2186662341349554156,12386834433895474628,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:14⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2186662341349554156,12386834433895474628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:14⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2186662341349554156,12386834433895474628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1740 /prefetch:14⤵PID:1728
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://4kqd3hmqgptupi3p.xkfi59.top/1C27-2959-DE46-0042-F7C53⤵PID:3284
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc1cde46f8,0x7ffc1cde4708,0x7ffc1cde47184⤵PID:5000
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:3308
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "RMActivate_isv.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{F970690B-9757-54C3-E1BF-B323E831ED35}\RMActivate_isv.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2296 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "RMActivate_isv.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3136
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4496
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "41d87fa0c9244a9a098742155a862e4d_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\41d87fa0c9244a9a098742155a862e4d_JaffaCakes118.exe" > NUL2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "41d87fa0c9244a9a098742155a862e4d_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4112
-
-
-
C:\Users\Admin\AppData\Roaming\{F970690B-9757-54C3-E1BF-B323E831ED35}\RMActivate_isv.exeC:\Users\Admin\AppData\Roaming\{F970690B-9757-54C3-E1BF-B323E831ED35}\RMActivate_isv.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
C:\Users\Admin\AppData\Roaming\{F970690B-9757-54C3-E1BF-B323E831ED35}\RMActivate_isv.exeC:\Users\Admin\AppData\Roaming\{F970690B-9757-54C3-E1BF-B323E831ED35}\RMActivate_isv.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1596
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4756
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x454 0x2f81⤵
- Suspicious use of AdjustPrivilegeToken
PID:3456
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
2Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5fa764a2fb4931a64228ec356ebf2a3ab
SHA1d2ead8c49fe392cd3f9a7cf7a8a4b17d198d8315
SHA256331446912400fcd44e2ab56e1c6cb43ca7816ca3afda44431542eb8d598de31a
SHA512acb3b3e4e5812cf1d150f2e4f82b2191feb2be67a6d4c6ba265b3cdecaf0695c2edfc296fd6c85e1e655f55ea21996b59e6832f7b7e3d3c68bf035c6e7b27ec6
-
Filesize
10KB
MD5dcaadb617f1e9fea376944403c11fb95
SHA18cf83a70025735a6a07f9d19c17f27e3f9b7f410
SHA25603b3682586e669f4604123608084bbfb98a40bf4c639c246ce0a8b99a973a573
SHA5122c64ba96381b71c8c1c349d6999a12dbac63ea662cdc557988c0e5041a8e58d5ba4003bcaa4403f0692a5200d74387c4b0658150abd77b3f32014a58e037e715
-
Filesize
85B
MD5d70ec7a2f83676fd71062a6c6aa348e8
SHA1242d7d69451bcb9fb8fc86054fc2d6dfda436e52
SHA256800b5060817a25216dbba676f621a77d9a20c204243694174f6a0c5d7011769a
SHA5128273bbcd227de8e5e69df7887def7fe79ece655cbc0bc7742e2663e6628d7bed91e37ae2b64ad40e1d55b16353a2d01b9f2a54189e4b117cee8663893fa9a02c
-
Filesize
231B
MD59d8c4bfbd009c4d6001e2125abaa8b02
SHA1cd040558172b5fca5b200447a281843956243741
SHA256a652297987f14317100f8c5f7eb26d1bc67eb8a64f0b39b72b5fd5046a9f29b0
SHA512c4c84f43642b805a105acce9ebc9f01aa0e6ef553ea32be3f8b890fc7440f0b7d3ddf99b9336bce20ce7a3d9b9f6434a704651a8af425ffc8407ba39d5de735f
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
6KB
MD53ff146d5484dfde9cbe34461d507f7db
SHA11fad042ffd5e68f1f7c49c81d43c1282cdbc8fe2
SHA2567f15908d5ae87aeb99652fb24f5fa67b3c9ce9b6408a1d20789128f280526e3b
SHA512b1fb5f697c1d39a46cf65a40409622587b1e03eed5a535e6d91c5d25c3367c791e09893c67a3238cb1fe90c2e9f2cb8c23aa197f04cbe6a3001767446aa3c694
-
Filesize
6KB
MD501ee997cf8cee28e66e1a76793e79554
SHA1660634fcd90cdef887325f62d7557ac35c5e5820
SHA256bf90f413b2b0abfcfb326f3e0f9853fef1918febfaba2f4c613bb548ced5e658
SHA512416f9bd085e9ef84d65960f907ca4a8034e656d60ca41f7acf599d31775264d751b8f8136c2ff66aa1048bb87023a3f31f2a706488c3e68f61243e12e6946a6d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52a8dd7759d77fa49cec69a0f8fc848b9
SHA1a3a76837566230234ad8359b8e9f2ef52d17dfec
SHA256a7c95d42ea7c2942f5bde08a82a99dc50b411a103bde0612181626e413810672
SHA512e26a92f77f2a6c618fbe71c2df860155c7dc9e11af786f3c97dba5fc208ce80aa764db64fa8f9acef1c420132484d0b2c0243571ffe1199c19256106c579df6d
-
Filesize
1KB
MD5297882119ae04ebe5898a517fcab418b
SHA11761105c5d51fd1d6139a095e1251f56329dceaa
SHA256a1c032cb8b6b2022738fa3fa598713c9b33ace77a5b42efd0aa0ea6a1215b0a8
SHA5126a08337839f0935732e9716cfe1a514b144158304476f06c7b29233a84eb7652e1940bd4978a3e49a4e9547704cc989670433b7480fa20bee8be066f1955306d
-
Filesize
382KB
MD541d87fa0c9244a9a098742155a862e4d
SHA1f80f8a9584fd4ec0a3e86f0a4bedd66bf204bcdc
SHA25660767e516dcf017b6a446f383a87afda3ce002292866195bdcffb5c8e9dac0c9
SHA512bed43d92325b572f9a1dde0f6088569679619b50d55f120b67b3db0c5dd3c1db604702881b0f7180f1a66069a9f0e2177b7bbd70af8e88da530563163afbd359