Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 01:51
Static task
static1
Behavioral task
behavioral1
Sample
8e8f6906971c9e1ab1f2501fc964ed7b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8e8f6906971c9e1ab1f2501fc964ed7b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8e8f6906971c9e1ab1f2501fc964ed7b_JaffaCakes118.exe
-
Size
264KB
-
MD5
8e8f6906971c9e1ab1f2501fc964ed7b
-
SHA1
49c3ce2c107bbd56ae100d2791431ecac5a911a2
-
SHA256
ae92a50a665ad98b9be56a48026f45f479b9058541687d94ed390be55c1eb4a5
-
SHA512
4e1275226c49c5b1f299c579084393e5cf5e0b9028a0419873cb0d397a30620d7387a79b7c9b772a6f21d0ba03323f132885f6133a56f19987218d3456fcd455
-
SSDEEP
6144:xSu7ftzi1GUIxsMVBGKnNhIMM/CU8Qmabiw3n3nvnnn/nnnPnPHnnnhnDK:xSupzozKngMFU8Qm2/3n3nvnnn/nnnPc
Malware Config
Extracted
C:\Users\Admin\Music\# DECRYPT MY FILES #.txt
cerber
http://4kqd3hmqgptupi3p.3odvfb.top/C311-F29D-FED3-006D-F1C6
http://4kqd3hmqgptupi3p.k9z7pm.top/C311-F29D-FED3-006D-F1C6
http://4kqd3hmqgptupi3p.daigy0.top/C311-F29D-FED3-006D-F1C6
http://4kqd3hmqgptupi3p.dd4xo3.top/C311-F29D-FED3-006D-F1C6
http://4kqd3hmqgptupi3p.onion.to/C311-F29D-FED3-006D-F1C6
http://4kqd3hmqgptupi3p.onion/C311-F29D-FED3-006D-F1C6
Extracted
C:\Users\Admin\Music\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\\logagent.exe\"" 8e8f6906971c9e1ab1f2501fc964ed7b_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\\logagent.exe\"" logagent.exe -
Contacts a large (528) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation logagent.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\logagent.lnk 8e8f6906971c9e1ab1f2501fc964ed7b_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\logagent.lnk logagent.exe -
Executes dropped EXE 2 IoCs
pid Process 4072 logagent.exe 2288 logagent.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\logagent = "\"C:\\Users\\Admin\\AppData\\Roaming\\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\\logagent.exe\"" logagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\logagent = "\"C:\\Users\\Admin\\AppData\\Roaming\\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\\logagent.exe\"" 8e8f6906971c9e1ab1f2501fc964ed7b_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\logagent = "\"C:\\Users\\Admin\\AppData\\Roaming\\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\\logagent.exe\"" 8e8f6906971c9e1ab1f2501fc964ed7b_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\logagent = "\"C:\\Users\\Admin\\AppData\\Roaming\\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\\logagent.exe\"" logagent.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpF680.bmp" logagent.exe -
Drops file in Program Files directory 16 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.url logagent.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\DESIGNER.ONE logagent.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.html logagent.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.vbs logagent.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\PLANNERS.ONE logagent.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.txt logagent.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote-manifest.ini logagent.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BLANK.ONE logagent.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.html logagent.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.vbs logagent.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\ACADEMIC.ONE logagent.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote.ini logagent.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BUSINESS.ONE logagent.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.txt logagent.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote-PipelineConfig.xml logagent.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.url logagent.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language logagent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e8f6906971c9e1ab1f2501fc964ed7b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language logagent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1956 cmd.exe 432 PING.EXE 5428 cmd.exe 5516 PING.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 3100 taskkill.exe 5372 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\Desktop 8e8f6906971c9e1ab1f2501fc964ed7b_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\\logagent.exe\"" 8e8f6906971c9e1ab1f2501fc964ed7b_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\Desktop logagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\\logagent.exe\"" logagent.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings logagent.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 432 PING.EXE 5516 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe 4072 logagent.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2320 8e8f6906971c9e1ab1f2501fc964ed7b_JaffaCakes118.exe Token: SeDebugPrivilege 3100 taskkill.exe Token: SeDebugPrivilege 4072 logagent.exe Token: SeDebugPrivilege 2288 logagent.exe Token: 33 3984 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3984 AUDIODG.EXE Token: SeDebugPrivilege 5372 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2320 wrote to memory of 4072 2320 8e8f6906971c9e1ab1f2501fc964ed7b_JaffaCakes118.exe 87 PID 2320 wrote to memory of 4072 2320 8e8f6906971c9e1ab1f2501fc964ed7b_JaffaCakes118.exe 87 PID 2320 wrote to memory of 4072 2320 8e8f6906971c9e1ab1f2501fc964ed7b_JaffaCakes118.exe 87 PID 2320 wrote to memory of 1956 2320 8e8f6906971c9e1ab1f2501fc964ed7b_JaffaCakes118.exe 88 PID 2320 wrote to memory of 1956 2320 8e8f6906971c9e1ab1f2501fc964ed7b_JaffaCakes118.exe 88 PID 2320 wrote to memory of 1956 2320 8e8f6906971c9e1ab1f2501fc964ed7b_JaffaCakes118.exe 88 PID 1956 wrote to memory of 3100 1956 cmd.exe 90 PID 1956 wrote to memory of 3100 1956 cmd.exe 90 PID 1956 wrote to memory of 3100 1956 cmd.exe 90 PID 1956 wrote to memory of 432 1956 cmd.exe 92 PID 1956 wrote to memory of 432 1956 cmd.exe 92 PID 1956 wrote to memory of 432 1956 cmd.exe 92 PID 4072 wrote to memory of 2936 4072 logagent.exe 104 PID 4072 wrote to memory of 2936 4072 logagent.exe 104 PID 2936 wrote to memory of 3708 2936 msedge.exe 105 PID 2936 wrote to memory of 3708 2936 msedge.exe 105 PID 4072 wrote to memory of 1492 4072 logagent.exe 106 PID 4072 wrote to memory of 1492 4072 logagent.exe 106 PID 4072 wrote to memory of 5564 4072 logagent.exe 107 PID 4072 wrote to memory of 5564 4072 logagent.exe 107 PID 5564 wrote to memory of 1288 5564 msedge.exe 108 PID 5564 wrote to memory of 1288 5564 msedge.exe 108 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 1920 2936 msedge.exe 109 PID 2936 wrote to memory of 3044 2936 msedge.exe 110 PID 2936 wrote to memory of 3044 2936 msedge.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e8f6906971c9e1ab1f2501fc964ed7b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8e8f6906971c9e1ab1f2501fc964ed7b_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Roaming\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\logagent.exe"C:\Users\Admin\AppData\Roaming\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\logagent.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb33d746f8,0x7ffb33d74708,0x7ffb33d747184⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,528165624491111584,10263497961119861625,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:24⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,528165624491111584,10263497961119861625,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:34⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,528165624491111584,10263497961119861625,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2572 /prefetch:84⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,528165624491111584,10263497961119861625,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:14⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,528165624491111584,10263497961119861625,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:14⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,528165624491111584,10263497961119861625,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3888 /prefetch:14⤵PID:5332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,528165624491111584,10263497961119861625,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:14⤵PID:5712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,528165624491111584,10263497961119861625,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:14⤵PID:5792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,528165624491111584,10263497961119861625,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:14⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,528165624491111584,10263497961119861625,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:14⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,528165624491111584,10263497961119861625,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4032 /prefetch:84⤵PID:5556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,528165624491111584,10263497961119861625,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4032 /prefetch:84⤵PID:5908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,528165624491111584,10263497961119861625,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:14⤵PID:5980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,528165624491111584,10263497961119861625,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:14⤵PID:6008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,528165624491111584,10263497961119861625,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1800 /prefetch:14⤵PID:3156
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://4kqd3hmqgptupi3p.3odvfb.top/C311-F29D-FED3-006D-F1C6?auto3⤵
- Suspicious use of WriteProcessMemory
PID:5564 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffb33d746f8,0x7ffb33d74708,0x7ffb33d747184⤵PID:1288
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:4540
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "logagent.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\logagent.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5428 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "logagent.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5372
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5516
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "8e8f6906971c9e1ab1f2501fc964ed7b_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\8e8f6906971c9e1ab1f2501fc964ed7b_JaffaCakes118.exe" > NUL2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "8e8f6906971c9e1ab1f2501fc964ed7b_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3100
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:432
-
-
-
C:\Users\Admin\AppData\Roaming\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\logagent.exeC:\Users\Admin\AppData\Roaming\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\logagent.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3792
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x49c 0x3e01⤵
- Suspicious use of AdjustPrivilegeToken
PID:3984
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
5KB
MD5fd7e451a15f31ea021e8b9e0c4c2d18e
SHA1b570b075d919813aa2e245fe552c18ba785eb5d4
SHA256b30bc322583e425b0f122079e323a38c751f77714f1bf6fea07e2ab39184ea6a
SHA512ae6d3c10dc45e68fd74e93d8b492a0d24a398e567517e0e9629bce999e2d7bf2ae5207f65e1fe49df5da914ce0722095d79463856329a327ff6344f643ad1d36
-
Filesize
6KB
MD5cc22c28dcf3a4e386582c16c4f8c6cf8
SHA16ed93a403e5d14c49cf85f83cc2b6306bbabbc27
SHA256acedbd7d82fed69b8197cc06cbfdbf9bc185f1ad346d3fece3e550b1e83b0d26
SHA512545b38440353bb18cd4b586425dd2e642aa592d47d4602ac182f5300baf13573e574fc3c5793e8cc379e0b992db9f54fe201c2c3fb4644b98a2839ceaf0d60a9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD587237593cd08e01d6b56786006c63773
SHA16db602d9be72646eb92df5c0652779c242e342f6
SHA2561881058d43d9b52c3327b011bd5b9430a826cf2849bb4b02a8beb11acb09cacf
SHA512c28d933ca52189c277574313b18a0ea57157f3dad0d532de929f464029fa4c6a0b09a98ea4cdef26e30ab460db69e0fb44179981a5b1a0cd64c6465fee82d15c
-
Filesize
1KB
MD50c02d43f37bc28d9a1220581c8acfb8b
SHA14bef2fd3ce5e26eb2ad57f0516811b9fb48526f4
SHA2568add15353c85e047ee4d733d623610fbc061788ca41eb99347ef0354a40092a8
SHA51212f3abc178970ff1b1d40721d3df3aac0a646b6fc88bbe5f835c9c8a89ad886f1cc34c753b72405306167c8ee913bbbae0198a7316fc3d561b83489bee0d4cf8
-
Filesize
264KB
MD58e8f6906971c9e1ab1f2501fc964ed7b
SHA149c3ce2c107bbd56ae100d2791431ecac5a911a2
SHA256ae92a50a665ad98b9be56a48026f45f479b9058541687d94ed390be55c1eb4a5
SHA5124e1275226c49c5b1f299c579084393e5cf5e0b9028a0419873cb0d397a30620d7387a79b7c9b772a6f21d0ba03323f132885f6133a56f19987218d3456fcd455
-
Filesize
19KB
MD51708242b1b58bd5575b5df4d5b5599e0
SHA1b45bd72c1a32f3b184b106b8e0512a083a85291f
SHA2568a1d7b4068f0545f0cae733a21322abab195e5d285aa76faab5b4b943650cf69
SHA512c3936a2cd033d2564f5ece4beb29edee395aedfeb195ef498f94ab230dd47f77c8a12aa54021acb40a7c8a44680d581d97a567972f4639537719868924ac9868
-
Filesize
10KB
MD59aa9c3a13c65aa0abc3109a6d9d77075
SHA16e1e0a62e8107f75bd0b6c2495384832987ae3ec
SHA25661bd132dd9805bdd5d4d16c7b75e1818f6b22c06eeb07a34f3d866467d42804f
SHA5125079314c0793debae2c02677dc4b7fad47abacd1ca3cefc4a001a8489be6883a1bca3728b2dc56149ca5ca3cbdcb11b22d00e03b6c8e221778702fb4f71cd61c
-
Filesize
90B
MD568819f8ef8743cfd8fa194dc81acf0c7
SHA15f844ff8d5dc9b2025f1ecd68c006da7e7f18f71
SHA256cf2b2cc093f852426333fe5282b6167fb531aeca7cb9c9c78c5622541a3cb41e
SHA51201b0a300b1f54c4d95e571185b527f33ef9f8bc3cc21dafe07ae69c6c4fb8fd05991cff97fa004558c7b645abd34680f0460f18b564e7d8920881b25a7ba0d83
-
Filesize
213B
MD51c2a24505278e661eca32666d4311ce5
SHA1d1deb57023bbe38a33f0894b6a9a7bbffbfdeeee
SHA2563f0dc6126cf33e7aa725df926a1b7d434eaf62a69f42e1b8ae4c110fd3572628
SHA512ce866f2c4b96c6c7c090f4bf1708bfebdfcd58ce65a23bdc124a13402ef4941377c7e286e6156a28bd229e422685454052382f1f532545bc2edf07be4861b36c