Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:19
Static task
static1
Behavioral task
behavioral1
Sample
b4f4957b8ace5c6a91d9178a03f33b97_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
b4f4957b8ace5c6a91d9178a03f33b97_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b4f4957b8ace5c6a91d9178a03f33b97_JaffaCakes118.exe
-
Size
135KB
-
MD5
b4f4957b8ace5c6a91d9178a03f33b97
-
SHA1
6cd8463d611c84b87e49f0f3541530eb08e857c5
-
SHA256
19abf7ed826edd9c98b153cc27b816936e1b7078c7c88c50844f05e12cdc206f
-
SHA512
da40e95e2b6560acab16d2a151bfa1e29f15f88907dd73e659c8b16583feed4d6e2847423d0bc2b97ecb951dec72066acc5151f91baf0c52400e774e8b1490ae
-
SSDEEP
1536:37v0kchIvFz70fiVdqDkhSchSWiSDWP/OsWQH6CazASXhXSWLlWT3PmcsYN/Xzgi:3ooF4iVdubWibOQNi3MWL4FksNYFfPK
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" plugin.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" watcher.exe -
A potential corporate email address has been identified in the URL: EC@avif
-
A potential corporate email address has been identified in the URL: FR@avif
-
A potential corporate email address has been identified in the URL: PC@avif
-
A potential corporate email address has been identified in the URL: U2@avif
-
A potential corporate email address has been identified in the URL: W4@avif
-
A potential corporate email address has been identified in the URL: W9@avif
-
Executes dropped EXE 2 IoCs
pid Process 2592 plugin.exe 3148 watcher.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Module = "%ALLUSERSPROFILE%\\Media\\plugin.exe" b4f4957b8ace5c6a91d9178a03f33b97_JaffaCakes118.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA plugin.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" watcher.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA watcher.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" plugin.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 2 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\ProgramData\Media\plugin.exe:Zone.Identifier cmd.exe File created C:\ProgramData\Media\watcher.exe:Zone.Identifier cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4f4957b8ace5c6a91d9178a03f33b97_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plugin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language watcher.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\ProgramData\Media\plugin.exe:Zone.Identifier cmd.exe File created C:\ProgramData\Media\watcher.exe:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2592 plugin.exe 2592 plugin.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe 3148 watcher.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2592 plugin.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 468 wrote to memory of 228 468 b4f4957b8ace5c6a91d9178a03f33b97_JaffaCakes118.exe 82 PID 468 wrote to memory of 228 468 b4f4957b8ace5c6a91d9178a03f33b97_JaffaCakes118.exe 82 PID 468 wrote to memory of 228 468 b4f4957b8ace5c6a91d9178a03f33b97_JaffaCakes118.exe 82 PID 468 wrote to memory of 2924 468 b4f4957b8ace5c6a91d9178a03f33b97_JaffaCakes118.exe 83 PID 468 wrote to memory of 2924 468 b4f4957b8ace5c6a91d9178a03f33b97_JaffaCakes118.exe 83 PID 468 wrote to memory of 2924 468 b4f4957b8ace5c6a91d9178a03f33b97_JaffaCakes118.exe 83 PID 468 wrote to memory of 2592 468 b4f4957b8ace5c6a91d9178a03f33b97_JaffaCakes118.exe 86 PID 468 wrote to memory of 2592 468 b4f4957b8ace5c6a91d9178a03f33b97_JaffaCakes118.exe 86 PID 468 wrote to memory of 2592 468 b4f4957b8ace5c6a91d9178a03f33b97_JaffaCakes118.exe 86 PID 2592 wrote to memory of 3148 2592 plugin.exe 87 PID 2592 wrote to memory of 3148 2592 plugin.exe 87 PID 2592 wrote to memory of 3148 2592 plugin.exe 87 PID 228 wrote to memory of 4740 228 cmd.exe 88 PID 228 wrote to memory of 4740 228 cmd.exe 88 PID 4740 wrote to memory of 1140 4740 msedge.exe 90 PID 4740 wrote to memory of 1140 4740 msedge.exe 90 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 3612 4740 msedge.exe 91 PID 4740 wrote to memory of 2208 4740 msedge.exe 92 PID 4740 wrote to memory of 2208 4740 msedge.exe 92 PID 4740 wrote to memory of 1336 4740 msedge.exe 93 PID 4740 wrote to memory of 1336 4740 msedge.exe 93 PID 4740 wrote to memory of 1336 4740 msedge.exe 93 PID 4740 wrote to memory of 1336 4740 msedge.exe 93 PID 4740 wrote to memory of 1336 4740 msedge.exe 93 PID 4740 wrote to memory of 1336 4740 msedge.exe 93 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System watcher.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" watcher.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System plugin.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" plugin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4f4957b8ace5c6a91d9178a03f33b97_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b4f4957b8ace5c6a91d9178a03f33b97_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\cmd.exe/c start http://youporn.ru2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://youporn.ru/3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffd47fa46f8,0x7ffd47fa4708,0x7ffd47fa47184⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1936,6849968572157971299,9620374712055383090,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1992 /prefetch:24⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1936,6849968572157971299,9620374712055383090,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 /prefetch:34⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1936,6849968572157971299,9620374712055383090,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:84⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,6849968572157971299,9620374712055383090,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:14⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,6849968572157971299,9620374712055383090,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:14⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,6849968572157971299,9620374712055383090,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2912 /prefetch:14⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,6849968572157971299,9620374712055383090,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:14⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,6849968572157971299,9620374712055383090,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:14⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1936,6849968572157971299,9620374712055383090,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:84⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1936,6849968572157971299,9620374712055383090,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:84⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,6849968572157971299,9620374712055383090,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:14⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,6849968572157971299,9620374712055383090,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:14⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,6849968572157971299,9620374712055383090,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5956 /prefetch:14⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,6849968572157971299,9620374712055383090,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:14⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1936,6849968572157971299,9620374712055383090,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5204 /prefetch:24⤵PID:4432
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\Media\rdb.bat2⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:2924
-
-
C:\ProgramData\Media\plugin.exe-wait2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2592 -
C:\ProgramData\Media\watcher.exeC:\ProgramData\Media\watcher.exe3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:3148
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4652
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1068
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5b4f4957b8ace5c6a91d9178a03f33b97
SHA16cd8463d611c84b87e49f0f3541530eb08e857c5
SHA25619abf7ed826edd9c98b153cc27b816936e1b7078c7c88c50844f05e12cdc206f
SHA512da40e95e2b6560acab16d2a151bfa1e29f15f88907dd73e659c8b16583feed4d6e2847423d0bc2b97ecb951dec72066acc5151f91baf0c52400e774e8b1490ae
-
Filesize
97B
MD55303b5018a6cd19200b98d31ab04f25d
SHA18285eb92f131111e40d2dc864d3b386dad6b9129
SHA256464648d492af6bb50cf65ddcbdca3e90d4b224ccc6f4ce3944d439b6c32da524
SHA512654aed00850f6b7e424a5ec5acad086a51fb54f5f944238979f43fa1aac430661250210fe5f38dcd78e46311adc7e6b282cb5c41bebfe5a7d297afd6db6de21b
-
Filesize
13B
MD538de427224a5082a04fe82e2bd4ea9ec
SHA17e4a53de1f83762dd2febd39b818e2258bc83bc1
SHA25612f99f53144294750fe8713d580eda286f4bd95cd9c840db8ab957def8040028
SHA512ec3f3c324eeaad91ab0efd47b3084493d863f969344fa1ba87ace1974908053d396673b44c33b4dceeef792a74ad9278e06acc27c83459af1153de52f83afcbf
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD57432b94c42b35edf3fcf64eca61be5be
SHA1c2f24ba0d21ec690060e942834b6d4ca5fcf0075
SHA256305bcfce1f4a67f8679d86713835fbef1bd26034e665567a3cf5fbdbc981c8fc
SHA512c8619b3848f4e36d8d27d83def2637b92137d93a2cba3f8f2939ccfbebf88dda5fd208ea706763473d1855397f3c9267d6aafbbfed0a85964d64cd874fdaa0df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD551b2ccec57250e0c10e6c8b79d82d1d2
SHA15d2a1744b0b67c1e0f03d2596ff8042b2c68ba6a
SHA25612e979bbe0543d4a60c80d9bc2d63128227fd21c9eb889411205f5731ea44767
SHA512e503d2e8f745500ca9ce05d563a978069e11158fd3eb097d2a76a846a28fd1b860f951cdb2b61221fa04add39fc38f58602b94f4dee7fb50841c71dc063a0606
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5e27e2622a90241df57a94faf90249735
SHA1e8fabffe96a3749bdbbaa120ad7754dedf3a2faf
SHA2567e298a83600af9c1a1ca9334aa3002ca38e3d8e01549580664748e2626597aaf
SHA5127a39035aecda674e855a3282ac5b8285121bb3dfa7dae61538b77d6a8676873d471e15c8f48611eaf9e281fa1276c29a5fb2cc9a4c9ff2242b50dbe1d47d8bb5
-
Filesize
1KB
MD5e62361f7bfff7e16b1aebaf400a813c1
SHA1bd88440018b190cd6473d5f576b807a518d9549b
SHA25620287a4673bb89ce932181de4bc45322a66d4461874774d6d94b18ea8c314813
SHA5122e63086bbe8071a27d99aba7308a90b3974c21dd095172c4231fc70012cd05463a4d4b00a9a89391bb21d0cbcc39708e628ed3497efa61c359a6e90a5c130a84
-
Filesize
5KB
MD5e6dcb2929c752e42f5a4b21e44cb4a42
SHA166a9fd44231c29f547745bc7c68bfb3d87e659d8
SHA256047d7bc2ae26f1fb5d3d96f7cb22258d32bc7314bc9e3928909959787987f2fb
SHA512df574316452ef80e88879ed74a3c68a75fdff5cc014f56102786eca33e5fef0ae45e5fd6d0b9a717a31fc2e9c23f5502b75feaeeed58a4babd11fc5ef3b0b4dd
-
Filesize
6KB
MD539f940c9b81a7f9dcb6cbff69ec3a51b
SHA1f175ac436a1d4197c27598ec8645ce6ac5d85e8d
SHA25682f402479602d3f591a951bc69e44fdbf98db233ec199a2fb23c2d2f79cf5327
SHA5129319948d403dcf294bb7df5f588ea395c38ea97df257c4406f20650764f63eb832cbc2a94dbf7e3256e3998b15f470e52230813fe49b0bf035c0b05fc63edff1
-
Filesize
7KB
MD540bc432f1a496187793e977065cf494b
SHA19088dee77f7ae4cb3037aaf419fcf5975ce92724
SHA25656b1d2fd61416f3d50bf4f0fd9c0f94a502046c1aa1c757e5466a774339f517c
SHA512139a14bfdeb224f2737ec965b1e57b28d7248bfd531eae8486bcb3562efbd1833f2c72fc2a7a8ec3674d146f3d33e47c3dd74c0c155063ac30b2b3724420b7e5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51982f7a7e010b3df08768023712e646d
SHA15c181a221b6c5f7a8ad797efe16a2f2b62189dc0
SHA256191c2b608d33a036ba0b9c42b71dbcad1a7717821eb704ddd8c6508658ca1094
SHA512cc378f98bd27b42a70f81a3f4bc5345e0ca273e278a38a59abfeebbb4a69cebc29b8b10cd48b49bc7900a8539aea68c31b0abdb7070356a5dce43cf29c1d656e
-
Filesize
10KB
MD5fd758e0499bd07f24974de98358bd558
SHA19ac075df4ac65e7c267286d7d458dbca3eb1f026
SHA2561a248f5751b12181ba29492fb606a8b55620933fe7a89dd60555c82621f57e8c
SHA5124473b4ebf66b4230df89a09796dedb28f94500043ce84f8d8532c0c28f22c439590f1223ac23bc6f7135f9e7e500925b0d413a0769b7f232b81e7e38fab91a35