Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 19:17
Static task
static1
Behavioral task
behavioral1
Sample
8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe
-
Size
384KB
-
MD5
8736b31e13bcd6e154dd6ad39b839f8c
-
SHA1
9135b9746cb37636cd26cbcc73ffd0451a34b426
-
SHA256
5207a70e0e818741279d7c25c0d9cb6be136a4fc8ca8fe6f48112c4d0572d64f
-
SHA512
1f8a4ca3b1d33e6208e45c8f42fa1650dd1b97162b499053cc45c034dc87f4d03448a4289d9efbc64bd0e135b7cb597036311dd0f5c763dd6ced6f36ac6a01bf
-
SSDEEP
6144:SeVGON09XRWtlggcMOEqmgWqvANwxcLSgL8J4bAvtqjPtW6wU25vB8ynNd98UW:gON09XotWgOfmgLA8cNYQAojtwU2xnv9
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\Recovery+vaskb.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/C75A7D5E23D68FE
http://tes543berda73i48fsdfsd.keratadze.at/C75A7D5E23D68FE
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/C75A7D5E23D68FE
http://xlowfznrg4wf7dli.ONION/C75A7D5E23D68FE
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (861) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exedlqhkhwjoghf.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation dlqhkhwjoghf.exe -
Drops startup file 6 IoCs
Processes:
dlqhkhwjoghf.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+vaskb.png dlqhkhwjoghf.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+vaskb.txt dlqhkhwjoghf.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+vaskb.html dlqhkhwjoghf.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+vaskb.png dlqhkhwjoghf.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+vaskb.txt dlqhkhwjoghf.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+vaskb.html dlqhkhwjoghf.exe -
Executes dropped EXE 2 IoCs
Processes:
dlqhkhwjoghf.exedlqhkhwjoghf.exepid process 3608 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
dlqhkhwjoghf.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\idwpqxymapag = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\dlqhkhwjoghf.exe\"" dlqhkhwjoghf.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exedlqhkhwjoghf.exedescription pid process target process PID 4064 set thread context of 4740 4064 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe PID 3608 set thread context of 2296 3608 dlqhkhwjoghf.exe dlqhkhwjoghf.exe -
Drops file in Program Files directory 64 IoCs
Processes:
dlqhkhwjoghf.exedescription ioc process File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\AppPackageAppList.targetsize-96_altform-unplated.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-white_targetsize-36_altform-unplated.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\Recovery+vaskb.html dlqhkhwjoghf.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt dlqhkhwjoghf.exe File opened for modification C:\Program Files\Google\Recovery+vaskb.txt dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteSectionGroupLargeTile.scale-400.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\en-GB\Recovery+vaskb.txt dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\EmptySearch.scale-125.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\27.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cgg\Recovery+vaskb.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\Recovery+vaskb.txt dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\StoreAppList.targetsize-16.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\LTR\contrast-black\SmallTile.scale-200.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\210x173\8.jpg dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\StoreLogo\PaintApplist.scale-200.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Audio\Skype_Dtmf_6.m4a dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-72_contrast-black.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\lo-LA\View3d\Recovery+vaskb.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteSectionMedTile.scale-400.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-72_altform-unplated.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailBadge.scale-100.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\Common Files\System\en-US\Recovery+vaskb.html dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-black\Recovery+vaskb.html dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\Recovery+vaskb.txt dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedWideTile.scale-100_contrast-black.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_neutral_~_8wekyb3d8bbwe\Recovery+vaskb.txt dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\LTR\contrast-black\SmallTile.scale-125.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppPackageMedTile.scale-100_contrast-white.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxAccountsSmallTile.scale-100.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\AppIcon.targetsize-24_altform-unplated.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.targetsize-30.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\AppIcon.targetsize-36_contrast-white.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\keystore\Recovery+vaskb.html dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Recovery+vaskb.txt dlqhkhwjoghf.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\en-us\Recovery+vaskb.txt dlqhkhwjoghf.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CAPSULES\THMBNAIL.PNG dlqhkhwjoghf.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\VBA\VBA6\Recovery+vaskb.html dlqhkhwjoghf.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\vi\Recovery+vaskb.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Recovery+vaskb.html dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubAppList.targetsize-80.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\fr-FR\Recovery+vaskb.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\XboxApp.UI\Resources\Images\star_qtr.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-black\Logo.scale-125_contrast-black.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\en-gb\jsaddins\Recovery+vaskb.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteNotebookSmallTile.scale-150.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-white\StoreLogo.scale-400_contrast-white.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarSmallTile.scale-150.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubAppList.targetsize-16_altform-unplated_contrast-high.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zu\Recovery+vaskb.txt dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-16_contrast-white.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Win10\Classic\FreeCell.Large.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_2019.729.2301.0_neutral_~_8wekyb3d8bbwe\Recovery+vaskb.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\MoviesAnywhereLogoWithTextLight.scale-200.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pl\LC_MESSAGES\Recovery+vaskb.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\Recovery+vaskb.txt dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-150_8wekyb3d8bbwe\Recovery+vaskb.txt dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\Json\Recovery+vaskb.html dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\TrafficHub\Recovery+vaskb.html dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Car\RTL\contrast-white\MedTile.scale-200.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\LTR\contrast-white\Recovery+vaskb.html dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_neutral_split.scale-100_8wekyb3d8bbwe\Recovery+vaskb.png dlqhkhwjoghf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\WorldClockMedTile.contrast-white_scale-200.png dlqhkhwjoghf.exe -
Drops file in Windows directory 2 IoCs
Processes:
8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exedescription ioc process File created C:\Windows\dlqhkhwjoghf.exe 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe File opened for modification C:\Windows\dlqhkhwjoghf.exe 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
dlqhkhwjoghf.execmd.exedlqhkhwjoghf.exeNOTEPAD.EXEcmd.exe8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dlqhkhwjoghf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dlqhkhwjoghf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 1 IoCs
Processes:
dlqhkhwjoghf.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings dlqhkhwjoghf.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 4472 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
dlqhkhwjoghf.exepid process 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe 2296 dlqhkhwjoghf.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exedlqhkhwjoghf.exeWMIC.exevssvc.exeWMIC.exedescription pid process Token: SeDebugPrivilege 4740 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe Token: SeDebugPrivilege 2296 dlqhkhwjoghf.exe Token: SeIncreaseQuotaPrivilege 4416 WMIC.exe Token: SeSecurityPrivilege 4416 WMIC.exe Token: SeTakeOwnershipPrivilege 4416 WMIC.exe Token: SeLoadDriverPrivilege 4416 WMIC.exe Token: SeSystemProfilePrivilege 4416 WMIC.exe Token: SeSystemtimePrivilege 4416 WMIC.exe Token: SeProfSingleProcessPrivilege 4416 WMIC.exe Token: SeIncBasePriorityPrivilege 4416 WMIC.exe Token: SeCreatePagefilePrivilege 4416 WMIC.exe Token: SeBackupPrivilege 4416 WMIC.exe Token: SeRestorePrivilege 4416 WMIC.exe Token: SeShutdownPrivilege 4416 WMIC.exe Token: SeDebugPrivilege 4416 WMIC.exe Token: SeSystemEnvironmentPrivilege 4416 WMIC.exe Token: SeRemoteShutdownPrivilege 4416 WMIC.exe Token: SeUndockPrivilege 4416 WMIC.exe Token: SeManageVolumePrivilege 4416 WMIC.exe Token: 33 4416 WMIC.exe Token: 34 4416 WMIC.exe Token: 35 4416 WMIC.exe Token: 36 4416 WMIC.exe Token: SeIncreaseQuotaPrivilege 4416 WMIC.exe Token: SeSecurityPrivilege 4416 WMIC.exe Token: SeTakeOwnershipPrivilege 4416 WMIC.exe Token: SeLoadDriverPrivilege 4416 WMIC.exe Token: SeSystemProfilePrivilege 4416 WMIC.exe Token: SeSystemtimePrivilege 4416 WMIC.exe Token: SeProfSingleProcessPrivilege 4416 WMIC.exe Token: SeIncBasePriorityPrivilege 4416 WMIC.exe Token: SeCreatePagefilePrivilege 4416 WMIC.exe Token: SeBackupPrivilege 4416 WMIC.exe Token: SeRestorePrivilege 4416 WMIC.exe Token: SeShutdownPrivilege 4416 WMIC.exe Token: SeDebugPrivilege 4416 WMIC.exe Token: SeSystemEnvironmentPrivilege 4416 WMIC.exe Token: SeRemoteShutdownPrivilege 4416 WMIC.exe Token: SeUndockPrivilege 4416 WMIC.exe Token: SeManageVolumePrivilege 4416 WMIC.exe Token: 33 4416 WMIC.exe Token: 34 4416 WMIC.exe Token: 35 4416 WMIC.exe Token: 36 4416 WMIC.exe Token: SeBackupPrivilege 4924 vssvc.exe Token: SeRestorePrivilege 4924 vssvc.exe Token: SeAuditPrivilege 4924 vssvc.exe Token: SeIncreaseQuotaPrivilege 3756 WMIC.exe Token: SeSecurityPrivilege 3756 WMIC.exe Token: SeTakeOwnershipPrivilege 3756 WMIC.exe Token: SeLoadDriverPrivilege 3756 WMIC.exe Token: SeSystemProfilePrivilege 3756 WMIC.exe Token: SeSystemtimePrivilege 3756 WMIC.exe Token: SeProfSingleProcessPrivilege 3756 WMIC.exe Token: SeIncBasePriorityPrivilege 3756 WMIC.exe Token: SeCreatePagefilePrivilege 3756 WMIC.exe Token: SeBackupPrivilege 3756 WMIC.exe Token: SeRestorePrivilege 3756 WMIC.exe Token: SeShutdownPrivilege 3756 WMIC.exe Token: SeDebugPrivilege 3756 WMIC.exe Token: SeSystemEnvironmentPrivilege 3756 WMIC.exe Token: SeRemoteShutdownPrivilege 3756 WMIC.exe Token: SeUndockPrivilege 3756 WMIC.exe Token: SeManageVolumePrivilege 3756 WMIC.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exedlqhkhwjoghf.exedlqhkhwjoghf.exemsedge.exedescription pid process target process PID 4064 wrote to memory of 4740 4064 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe PID 4064 wrote to memory of 4740 4064 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe PID 4064 wrote to memory of 4740 4064 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe PID 4064 wrote to memory of 4740 4064 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe PID 4064 wrote to memory of 4740 4064 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe PID 4064 wrote to memory of 4740 4064 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe PID 4064 wrote to memory of 4740 4064 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe PID 4064 wrote to memory of 4740 4064 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe PID 4064 wrote to memory of 4740 4064 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe PID 4064 wrote to memory of 4740 4064 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe PID 4740 wrote to memory of 3608 4740 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe dlqhkhwjoghf.exe PID 4740 wrote to memory of 3608 4740 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe dlqhkhwjoghf.exe PID 4740 wrote to memory of 3608 4740 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe dlqhkhwjoghf.exe PID 4740 wrote to memory of 5036 4740 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe cmd.exe PID 4740 wrote to memory of 5036 4740 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe cmd.exe PID 4740 wrote to memory of 5036 4740 8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe cmd.exe PID 3608 wrote to memory of 2296 3608 dlqhkhwjoghf.exe dlqhkhwjoghf.exe PID 3608 wrote to memory of 2296 3608 dlqhkhwjoghf.exe dlqhkhwjoghf.exe PID 3608 wrote to memory of 2296 3608 dlqhkhwjoghf.exe dlqhkhwjoghf.exe PID 3608 wrote to memory of 2296 3608 dlqhkhwjoghf.exe dlqhkhwjoghf.exe PID 3608 wrote to memory of 2296 3608 dlqhkhwjoghf.exe dlqhkhwjoghf.exe PID 3608 wrote to memory of 2296 3608 dlqhkhwjoghf.exe dlqhkhwjoghf.exe PID 3608 wrote to memory of 2296 3608 dlqhkhwjoghf.exe dlqhkhwjoghf.exe PID 3608 wrote to memory of 2296 3608 dlqhkhwjoghf.exe dlqhkhwjoghf.exe PID 3608 wrote to memory of 2296 3608 dlqhkhwjoghf.exe dlqhkhwjoghf.exe PID 3608 wrote to memory of 2296 3608 dlqhkhwjoghf.exe dlqhkhwjoghf.exe PID 2296 wrote to memory of 4416 2296 dlqhkhwjoghf.exe WMIC.exe PID 2296 wrote to memory of 4416 2296 dlqhkhwjoghf.exe WMIC.exe PID 2296 wrote to memory of 4472 2296 dlqhkhwjoghf.exe NOTEPAD.EXE PID 2296 wrote to memory of 4472 2296 dlqhkhwjoghf.exe NOTEPAD.EXE PID 2296 wrote to memory of 4472 2296 dlqhkhwjoghf.exe NOTEPAD.EXE PID 2296 wrote to memory of 2572 2296 dlqhkhwjoghf.exe msedge.exe PID 2296 wrote to memory of 2572 2296 dlqhkhwjoghf.exe msedge.exe PID 2572 wrote to memory of 3944 2572 msedge.exe msedge.exe PID 2572 wrote to memory of 3944 2572 msedge.exe msedge.exe PID 2296 wrote to memory of 3756 2296 dlqhkhwjoghf.exe WMIC.exe PID 2296 wrote to memory of 3756 2296 dlqhkhwjoghf.exe WMIC.exe PID 2572 wrote to memory of 4064 2572 msedge.exe msedge.exe PID 2572 wrote to memory of 4064 2572 msedge.exe msedge.exe PID 2572 wrote to memory of 4064 2572 msedge.exe msedge.exe PID 2572 wrote to memory of 4064 2572 msedge.exe msedge.exe PID 2572 wrote to memory of 4064 2572 msedge.exe msedge.exe PID 2572 wrote to memory of 4064 2572 msedge.exe msedge.exe PID 2572 wrote to memory of 4064 2572 msedge.exe msedge.exe PID 2572 wrote to memory of 4064 2572 msedge.exe msedge.exe PID 2572 wrote to memory of 4064 2572 msedge.exe msedge.exe PID 2572 wrote to memory of 4064 2572 msedge.exe msedge.exe PID 2572 wrote to memory of 4064 2572 msedge.exe msedge.exe PID 2572 wrote to memory of 4064 2572 msedge.exe msedge.exe PID 2572 wrote to memory of 4064 2572 msedge.exe msedge.exe PID 2572 wrote to memory of 4064 2572 msedge.exe msedge.exe PID 2572 wrote to memory of 4064 2572 msedge.exe msedge.exe PID 2572 wrote to memory of 4064 2572 msedge.exe msedge.exe PID 2572 wrote to memory of 4064 2572 msedge.exe msedge.exe PID 2572 wrote to memory of 4064 2572 msedge.exe msedge.exe PID 2572 wrote to memory of 4064 2572 msedge.exe msedge.exe PID 2572 wrote to memory of 4064 2572 msedge.exe msedge.exe PID 2572 wrote to memory of 4064 2572 msedge.exe msedge.exe PID 2572 wrote to memory of 4064 2572 msedge.exe msedge.exe PID 2572 wrote to memory of 4064 2572 msedge.exe msedge.exe PID 2572 wrote to memory of 4064 2572 msedge.exe msedge.exe PID 2572 wrote to memory of 4064 2572 msedge.exe msedge.exe PID 2572 wrote to memory of 4064 2572 msedge.exe msedge.exe PID 2572 wrote to memory of 4064 2572 msedge.exe msedge.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
dlqhkhwjoghf.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System dlqhkhwjoghf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" dlqhkhwjoghf.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8736b31e13bcd6e154dd6ad39b839f8c_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\dlqhkhwjoghf.exeC:\Windows\dlqhkhwjoghf.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\dlqhkhwjoghf.exeC:\Windows\dlqhkhwjoghf.exe4⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2296 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:4416
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT5⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RECOVERY.HTM5⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbe14446f8,0x7ffbe1444708,0x7ffbe14447186⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,1725806745508988703,4729998753872252591,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:26⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,1725806745508988703,4729998753872252591,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:36⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,1725806745508988703,4729998753872252591,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:86⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1725806745508988703,4729998753872252591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:16⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1725806745508988703,4729998753872252591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:16⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,1725806745508988703,4729998753872252591,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 /prefetch:86⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,1725806745508988703,4729998753872252591,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 /prefetch:86⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1725806745508988703,4729998753872252591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:16⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1725806745508988703,4729998753872252591,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:16⤵PID:308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1725806745508988703,4729998753872252591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:16⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1725806745508988703,4729998753872252591,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3932 /prefetch:16⤵PID:3752
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:3756
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\DLQHKH~1.EXE5⤵
- System Location Discovery: System Language Discovery
PID:1392
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\8736B3~1.EXE3⤵
- System Location Discovery: System Language Discovery
PID:5036
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4924
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3636
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5f422e6737f6f4d842404822f0e8e8b86
SHA112c57848aaad97fb9af11da2acc059b00d5931b1
SHA2566a3aedb82fdb490fa78fb9dcae256ed415d9ccc407a18bcaed8a9e12e1e62ed8
SHA512ef9ebf14c6f3fc9b4704024137b8993a9d127c44f1220a2a30c3b6f068b317edba9037cf75ee6282cfe733e97156459468bc97d45ef6fadec048093757e5e4c7
-
Filesize
64KB
MD5975dfe5d300a434f135bee620493e960
SHA1123b78ccf0c428c8099f631733cb16bb097ce7d1
SHA256c80dea46e2567c846af269e40de97250b9e254924581ff8489f708590dae0ef4
SHA512de456bb631a017dbed0a750d2e1abbec40711c401f5fc4e1807e200c674ca20fd442b1c2926d465091c9734a1ce3f6c716a4085842239d2b5f3396c234da0f86
-
Filesize
1KB
MD514613dba88591bbb34213a680a609142
SHA12886b0c00f60295058eb418c53a1e3fca5bde07b
SHA256d04cd89b72a18607ca2c52d1569927e7dc7ec0d80af84e7fe00586fe7beca84b
SHA5121c709fda448eaea2f7d4c1e88ca373222700842183de678b390711172c2440a3240c21e24232681f77a7cffd17fe0e6a48e77ddb0202fdf21e8bcbf8d1947dc9
-
Filesize
560B
MD5028bd851193cd31ffec70da7cdd6894b
SHA18b2a4ba50ef313b23e16e0a9dcd6dedee61e4650
SHA256e9c9c607bc5d5dbb6791694001f8b959fd41e982b11a28ae10efe1da97639b1d
SHA512435ac88eadb92ef33d93dbc59b4695c9f27a436523d05cfca2870bde8fefc2c89b49688fb8207bcc7e430e0a5266c239fc3f2b4598dcf6ec75d653920f5a319a
-
Filesize
560B
MD523cdc52fd2d4c31b77572354db87cb5c
SHA1caeb5a1f5234f811d72dbacc480a09e3d05286a3
SHA2569dd23948edcf1c519c9bdede22295e54f763c9e88448e50ee5f775614f9ccd68
SHA5127922fd74f3f590b40c231f47ec093f5151ac6553a1e8896954887abfa09e9afbd2c1c0dd2cf3e5cb587a01e7d1d7cf0c503c2e32eba524c5f3a17e0c41bae443
-
Filesize
416B
MD595123e7c36e7509a5716079387e69045
SHA1af6b8fe21bb59fd95afa4947ec2f440a82c78ab5
SHA2566222d3f339efbb0624227784db2a2414a46e73c56084cc2889ea3f717093f98f
SHA51214da8f17c12d9ff8e688d491f91565408f1e665f886451ffc13cef4b60361a9004bc6cc4bf26b1e59f9a2bca81b062361c5f71327c3d8f34901a75a92cb31b74
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
5KB
MD59e77327342103bd08b1422442141690c
SHA19f1c4462f88d951e554bb01ae8e011bacb5b908e
SHA25679a1ab651db7f03a725c772dcf0ad5c44698c8ec56d3655461525e7a5021861b
SHA512a81f10a7c645ab49038ab5873ce9afa3a8e9a6d499c75035f8c0091d618fb0ef86ee590e0a9eab786a27580a8dc4da0983fd5b51e7477bc779673b2d5c429d55
-
Filesize
6KB
MD54f657a066cc0c6d542a994b366bc88d9
SHA1e2ffb98d92c6c3c138ef871f1d83adbcf27aeeea
SHA256372c1ec580b115015b7e817b3f2e90181e0f4cc66988fdb4291b6002406646c3
SHA51270cc5dd0ac5f852e14af94a338945388289ea9897e7b768f0d9d1e3d7736c65980e23563313cd58a8aa75a57283ddc997cba065536c50816724b45c190ce2373
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD57a90f2fb7079234a34eefc5939a3c9f0
SHA1f3fda053fe1eedcd3295b07907518bf434444cd2
SHA256bc496c31c79dc604a8d9fd45fcb7c1cd5982b644b0f6d3580d7ef7a698a066ba
SHA5128f2035f3a06b27e17c9e37059ccc7ca467625f045090781a2c735c57a19b4a4a179921ed9b81aca833593e784c0d00d7ea42f969032f33f47af2dab94bc9aa81
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727658865736960.txt
Filesize77KB
MD50d26b32eee8e1c0c7a5900a64e52eb24
SHA11475cffc18686a3dbbb26e0bf71027e6350bf6ea
SHA256e2c0f7a3d95030a14f5f09d1a86ed72ab801f394750fa403b6746af26eece576
SHA5122fed2cb1eb8417eeff27f25d3c2718a76c2037f1b8671d650b5e73b6a63f9f2a465341008a37edb8cbf09f76b7f6d60844edb465bf732f3d52c59109e202ba87
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727660257997193.txt
Filesize47KB
MD5d951d580878d3c772553e487ccc28cdc
SHA1836214f98f353b1a5131b58e70c4ed4c28f2757f
SHA2569cac2b2b84d1712662a1fb8aa1966ca69a6e526e93e4d6650128072c0b009131
SHA51267012da935aae005197a8a1f41faf1ec4566aa0b2430fe89f344a346a7093cdc9bc8a2b7db27cb61abce34aa6b655943ca58f60a6dc5fa9fdca3f016c680c945
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727667861810871.txt
Filesize74KB
MD55e9cbaebda55ac198c35d98c948d3254
SHA184d193fa98c7ca05fd34aa93405ea20d3033bda1
SHA256e310e60ec776100168373048c7516512e47dff6ace960797609c5ad6dd66ccac
SHA51211b2859d999769f7640d56580fa5abbc8a963fab54818d605398ea09c555f305372a94e1e70fd0716d54af1b522cefa9d8701c0e70f8fbbb2b072026fdcd911a
-
Filesize
384KB
MD58736b31e13bcd6e154dd6ad39b839f8c
SHA19135b9746cb37636cd26cbcc73ffd0451a34b426
SHA2565207a70e0e818741279d7c25c0d9cb6be136a4fc8ca8fe6f48112c4d0572d64f
SHA5121f8a4ca3b1d33e6208e45c8f42fa1650dd1b97162b499053cc45c034dc87f4d03448a4289d9efbc64bd0e135b7cb597036311dd0f5c763dd6ced6f36ac6a01bf
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e