Analysis

  • max time kernel
    63s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/01/2025, 09:32

General

  • Target

    JaffaCakes118_723222debf568c7c71f6e34811d2bad1.exe

  • Size

    667KB

  • MD5

    723222debf568c7c71f6e34811d2bad1

  • SHA1

    1ea24d28c758f02bbc353fe2cf13332b6b78d4e6

  • SHA256

    29de0866405368bcef2f44542611f8d160d44d1fa6fbe731dc1c32674f1da75c

  • SHA512

    32cfd2d992c1a512783ba9eea092b94ca7b1d7d73d0847a307f50aaff2790ca8f05b24407769042699f1e90d0ec6007c1dceb6ab73001683ae729722fac32416

  • SSDEEP

    12288:WbMqm6EEb4E9F/ATyGv4XKGQi2lJLm1Giizl6oAlpxElrW1A:WIoEEb4Ev/ATEXKGVnGTzpA1Ec1A

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modifies security service 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modiloader family
  • ModiLoader Second Stage 7 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 6 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables taskbar notifications via registry modification
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Adds Run key to start application 2 TTPs 42 IoCs
  • Enumerates connected drives 3 TTPs 12 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_723222debf568c7c71f6e34811d2bad1.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_723222debf568c7c71f6e34811d2bad1.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_723222debf568c7c71f6e34811d2bad1.exe
      JaffaCakes118_723222debf568c7c71f6e34811d2bad1.exe
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1116
      • C:\Users\Admin\DV245F.exe
        C:\Users\Admin\DV245F.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3152
        • C:\Users\Admin\nioro.exe
          "C:\Users\Admin\nioro.exe"
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1020
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c tasklist&&del DV245F.exe
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:684
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            5⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:920
      • C:\Users\Admin\aohost.exe
        C:\Users\Admin\aohost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2316
        • C:\Users\Admin\aohost.exe
          aohost.exe
          4⤵
          • Executes dropped EXE
          • Maps connected drives based on registry
          • Suspicious behavior: EnumeratesProcesses
          PID:928
      • C:\Users\Admin\bohost.exe
        C:\Users\Admin\bohost.exe
        3⤵
        • Modifies security service
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:3756
        • C:\Users\Admin\bohost.exe
          C:\Users\Admin\bohost.exe startC:\Users\Admin\AppData\Roaming\9EC28\3CE00.exe%C:\Users\Admin\AppData\Roaming\9EC28
          4⤵
          • Executes dropped EXE
          PID:1104
        • C:\Users\Admin\bohost.exe
          C:\Users\Admin\bohost.exe startC:\Program Files (x86)\28C4E\lvvm.exe%C:\Program Files (x86)\28C4E
          4⤵
          • Executes dropped EXE
          PID:4240
      • C:\Users\Admin\dohost.exe
        C:\Users\Admin\dohost.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1768
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c tasklist&&del JaffaCakes118_723222debf568c7c71f6e34811d2bad1.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:620
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          4⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:3732
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4344
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3920
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2500
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:624
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3844
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4492
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4084
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4020
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Suspicious use of SendNotifyMessage
    PID:3292
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3796
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3384
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:4256
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4868
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2124
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:1584
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
      PID:4420
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
        PID:436
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
          PID:2920
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
            PID:3700
          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
            1⤵
              PID:532
            • C:\Windows\explorer.exe
              explorer.exe
              1⤵
                PID:3744
              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                1⤵
                  PID:2500
                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                  1⤵
                    PID:1664
                  • C:\Windows\explorer.exe
                    explorer.exe
                    1⤵
                      PID:3436
                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                      1⤵
                        PID:3280
                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                        1⤵
                          PID:1524
                        • C:\Windows\explorer.exe
                          explorer.exe
                          1⤵
                            PID:4148
                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                            1⤵
                              PID:2812
                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                              1⤵
                                PID:1268
                              • C:\Windows\explorer.exe
                                explorer.exe
                                1⤵
                                  PID:2236
                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                  1⤵
                                    PID:3428
                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                    1⤵
                                      PID:2680
                                    • C:\Windows\explorer.exe
                                      explorer.exe
                                      1⤵
                                        PID:3440
                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                        1⤵
                                          PID:4788
                                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                          1⤵
                                            PID:1500
                                          • C:\Windows\explorer.exe
                                            explorer.exe
                                            1⤵
                                              PID:552
                                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                              1⤵
                                                PID:4108
                                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                1⤵
                                                  PID:4084
                                                • C:\Windows\explorer.exe
                                                  explorer.exe
                                                  1⤵
                                                    PID:768
                                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                    1⤵
                                                      PID:4072
                                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                      1⤵
                                                        PID:2204
                                                      • C:\Windows\explorer.exe
                                                        explorer.exe
                                                        1⤵
                                                          PID:4568
                                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                          1⤵
                                                            PID:4856
                                                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                            1⤵
                                                              PID:3972
                                                            • C:\Windows\explorer.exe
                                                              explorer.exe
                                                              1⤵
                                                                PID:4108
                                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                1⤵
                                                                  PID:724
                                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                  1⤵
                                                                    PID:3556
                                                                  • C:\Windows\explorer.exe
                                                                    explorer.exe
                                                                    1⤵
                                                                      PID:4744
                                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                      1⤵
                                                                        PID:3760
                                                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                        1⤵
                                                                          PID:3176
                                                                        • C:\Windows\explorer.exe
                                                                          explorer.exe
                                                                          1⤵
                                                                            PID:4156
                                                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                            1⤵
                                                                              PID:3700
                                                                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                              1⤵
                                                                                PID:1984
                                                                              • C:\Windows\explorer.exe
                                                                                explorer.exe
                                                                                1⤵
                                                                                  PID:2236
                                                                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                  1⤵
                                                                                    PID:4876
                                                                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                    1⤵
                                                                                      PID:1260
                                                                                    • C:\Windows\explorer.exe
                                                                                      explorer.exe
                                                                                      1⤵
                                                                                        PID:3664
                                                                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                        1⤵
                                                                                          PID:5044
                                                                                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                          1⤵
                                                                                            PID:2560
                                                                                          • C:\Windows\explorer.exe
                                                                                            explorer.exe
                                                                                            1⤵
                                                                                              PID:5104
                                                                                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                              1⤵
                                                                                                PID:4444
                                                                                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                                1⤵
                                                                                                  PID:180
                                                                                                • C:\Windows\explorer.exe
                                                                                                  explorer.exe
                                                                                                  1⤵
                                                                                                    PID:3776
                                                                                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                                    1⤵
                                                                                                      PID:1220
                                                                                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                                      1⤵
                                                                                                        PID:1524
                                                                                                      • C:\Windows\explorer.exe
                                                                                                        explorer.exe
                                                                                                        1⤵
                                                                                                          PID:1172

                                                                                                        Network

                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                        Replay Monitor

                                                                                                        Loading Replay Monitor...

                                                                                                        Downloads

                                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

                                                                                                          Filesize

                                                                                                          471B

                                                                                                          MD5

                                                                                                          099cec3daf6c8b40cd9202ac854db03e

                                                                                                          SHA1

                                                                                                          9cd799dacdfffd54ec2379b375eedfc233719876

                                                                                                          SHA256

                                                                                                          5066c81360e6624f3d818b28173d8861ae4527e542b4b3f17bf426eab079ebf2

                                                                                                          SHA512

                                                                                                          b4e742f28d4c0e150a71ffdc2c12172bd8b64d48d019d76fc201d9a6704f09f391c8952b215ce7ec64995a81ca4c06ec8b29d3c9143ced8dcae30b3ae422d667

                                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

                                                                                                          Filesize

                                                                                                          412B

                                                                                                          MD5

                                                                                                          01dfe30ab76ddce150848465d19ffd94

                                                                                                          SHA1

                                                                                                          0bd22c2119e668594b7937f1035236680acce2dd

                                                                                                          SHA256

                                                                                                          6e54e29c1cede9f2cb3d99e8a18077e216de1f6b9279430f716691885ce0619a

                                                                                                          SHA512

                                                                                                          0102cfec70ec046224d6f3e2e941570c111eb9075dd506ab71ec3e0112afd912e362650f70e4a08809b40338df11ab42c2bfb1203df79f58e9665b890de7832d

                                                                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          fa412b9f969249de2d32ce61193f02f6

                                                                                                          SHA1

                                                                                                          a864bcedb446da19a0b9a0afbec0cb540ffd0376

                                                                                                          SHA256

                                                                                                          facf152a4cc7a6606dea3427402c991c3a74f49c2fb008cc71b5b2a2c3e4547b

                                                                                                          SHA512

                                                                                                          e5cc069cae96d7c94f0665ae41bb3d380f6dc5360aaab3e3026a78552347b0aa2a767b278da021c0b8dd3c8715aeef53b424755461cd6314eaeaf2a6161b546b

                                                                                                        • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\2CFNWDLC\microsoft.windows[1].xml

                                                                                                          Filesize

                                                                                                          97B

                                                                                                          MD5

                                                                                                          539db492f33fccee9be530dd0bf34a46

                                                                                                          SHA1

                                                                                                          650b2a3583d6c9499b4ed73e9a5dca37f342a50e

                                                                                                          SHA256

                                                                                                          f6d425aad05b46e77b53e5737c85f4ceab6531e773ea87eb985754be5ec19999

                                                                                                          SHA512

                                                                                                          9328f2fa286b4a9ca6ae57ddd9fca0b1140e5f68a5e143fd8ae6ea212a1af5d7b6b2289c324fa9480ca8d2e6d3b0cf7115611a56a3a161c5ad2f988f6ae62a0a

                                                                                                        • C:\Users\Admin\AppData\Roaming\9EC28\8C4E.EC2

                                                                                                          Filesize

                                                                                                          996B

                                                                                                          MD5

                                                                                                          97d3a209ab55c1ecf17e9bb545589fa5

                                                                                                          SHA1

                                                                                                          d8708d0733586d5b4019fc5a9c516330bf490c71

                                                                                                          SHA256

                                                                                                          af6d3f984997faedaf297879e1b0e100ec762ce99eef01e917fc0b7c9272e63c

                                                                                                          SHA512

                                                                                                          5d93f2761f0ade9dda61494536c38c8ec1ab7de8f1c5343432fb5f17557a19bd2480f304106f97ebf2b4bba811de86ae01a1f1e7d9a818eb3069b7677580b767

                                                                                                        • C:\Users\Admin\AppData\Roaming\9EC28\8C4E.EC2

                                                                                                          Filesize

                                                                                                          1KB

                                                                                                          MD5

                                                                                                          82dc5d3146e39a2a4ba40e858ec86b19

                                                                                                          SHA1

                                                                                                          cd2621ce43d67a5da5f4899e2d4fe35fbf4489c1

                                                                                                          SHA256

                                                                                                          6b220d6e24e47e64a480de480cbf7ace608c15526266b699091c09736ae1b2c5

                                                                                                          SHA512

                                                                                                          e242bafbc465c9b2da1948c0949d851bf7a0beb6da61636bf0c518b7aedbf20c9dae158d75ee132456fe87758d497da75f75669764fe90c1984f5ec02879f098

                                                                                                        • C:\Users\Admin\AppData\Roaming\9EC28\8C4E.EC2

                                                                                                          Filesize

                                                                                                          1KB

                                                                                                          MD5

                                                                                                          29481e30e82c08a7bd2d42b0209eff3f

                                                                                                          SHA1

                                                                                                          cf3a0c6c8524a1964e713d1b7ec56f368aff2e5b

                                                                                                          SHA256

                                                                                                          808abaa44268d1729c894e88f565ffd11d44f50e2b3364e499ca0601f3a361b1

                                                                                                          SHA512

                                                                                                          1d7b4ce7145e746d8e6f1f2dd3e62d542526f8e7ba8ce49658e3b7ced8ac9549b5c3380e76c13b2e8fe52732090936a3b432e9ce964e48e4e2ffc1fc7faa3637

                                                                                                        • C:\Users\Admin\AppData\Roaming\9EC28\8C4E.EC2

                                                                                                          Filesize

                                                                                                          600B

                                                                                                          MD5

                                                                                                          89ed74e9b4266fabab3ba5068126dc04

                                                                                                          SHA1

                                                                                                          42f9390fa0d25bfb37fa374dc3107b5253712ce5

                                                                                                          SHA256

                                                                                                          36be042263615b7c31a2bca60e62b9d9cbaae2a90bd185337e0b5f22f5dd7196

                                                                                                          SHA512

                                                                                                          5cd75e7500d418988315e9c4ec993ca983f2ba8adf496e000bdf414be6f8a5861a6a93a9db13a620c5f92aaba4741be6d2935d208f6d94d7f7342f13eeb9bd22

                                                                                                        • C:\Users\Admin\DV245F.exe

                                                                                                          Filesize

                                                                                                          216KB

                                                                                                          MD5

                                                                                                          00b1af88e176b5fdb1b82a38cfdce35b

                                                                                                          SHA1

                                                                                                          c0f77262df92698911e0ac2f7774e93fc6b06280

                                                                                                          SHA256

                                                                                                          50f026d57fea9c00d49629484442ea59cccc0053d7db73168d68544a3bbf6f59

                                                                                                          SHA512

                                                                                                          9e55e7c440af901f9c6d0cdae619f6e964b9b75c9351c76ea64362ff161c150b12a1caabb3d2eb63353a59ae70e7159ca6b3793ed0cc11994766846ac316107f

                                                                                                        • C:\Users\Admin\aohost.exe

                                                                                                          Filesize

                                                                                                          152KB

                                                                                                          MD5

                                                                                                          4401958b004eb197d4f0c0aaccee9a18

                                                                                                          SHA1

                                                                                                          50e600f7c5c918145c5a270b472b114faa72a971

                                                                                                          SHA256

                                                                                                          4c477ed134bc76fa7b912f1aad5e59d4f56f993baa16646e25fec2fdeed3bd8b

                                                                                                          SHA512

                                                                                                          f0548bdaafce2cde2f9d3bd1c26ed3c8e9321ef6d706bd372e18886d834828e5bb54ae44f19764e94574ceb4a1a2a99bdd8476e174b05114fcac9a6d4a2d58e6

                                                                                                        • C:\Users\Admin\bohost.exe

                                                                                                          Filesize

                                                                                                          173KB

                                                                                                          MD5

                                                                                                          0578a41258df62b7b4320ceaafedde53

                                                                                                          SHA1

                                                                                                          50e7c0b00f8f1e5355423893f10ae8ee844d70f4

                                                                                                          SHA256

                                                                                                          18941e3030ef70437a5330e4689ec262f887f6f6f1da1cd66c0cbae2a76e75bf

                                                                                                          SHA512

                                                                                                          5870a73798bad1f92b4d79f20bf618112ec8917574f6b25ab968c47afff419a829eef57b0282fb4c53e6e636436c8cf52a01426c46bdd4a0ea948d371f0feb09

                                                                                                        • C:\Users\Admin\dohost.exe

                                                                                                          Filesize

                                                                                                          24KB

                                                                                                          MD5

                                                                                                          d7390e209a42ea46d9cbfc5177b8324e

                                                                                                          SHA1

                                                                                                          eff57330de49be19d2514dd08e614afc97b061d2

                                                                                                          SHA256

                                                                                                          d2d49c37bdf2313756897245c3050494b39e824af448450eca1c0e83cf95b1e5

                                                                                                          SHA512

                                                                                                          de0eb11dd20cd9d74f47b138fb4189a299a57173fe2635150045b01629354f35b26e0575acd25501403af0db238a123b2e5a79582b47aee1d6e786f5eec1929d

                                                                                                        • C:\Users\Admin\nioro.exe

                                                                                                          Filesize

                                                                                                          216KB

                                                                                                          MD5

                                                                                                          25585b8c2fa9646d388bd2867bae07ba

                                                                                                          SHA1

                                                                                                          27252cb41567b8dcc6284b208c246a895d79a70c

                                                                                                          SHA256

                                                                                                          ad312102dedc672a552cfbb8c6a578a23c2e68be7247572e5bea81348067151f

                                                                                                          SHA512

                                                                                                          5ab240f76dc04d7b141c11ef2d0ab0fb319a1be9c9f61ed2c61ccceec38b0732d669f830e035974f20211077b8c38a2b0046a6f92201887c378ce35516b845a1

                                                                                                        • memory/436-733-0x000001F49ED20000-0x000001F49ED40000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/436-765-0x000001F49F0F0000-0x000001F49F110000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/436-746-0x000001F49E9E0000-0x000001F49EA00000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/532-881-0x0000017084500000-0x0000017084600000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/532-885-0x00000170854E0000-0x0000017085500000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/532-880-0x0000017084500000-0x0000017084600000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/532-895-0x00000170854A0000-0x00000170854C0000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/532-917-0x0000017085AC0000-0x0000017085AE0000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/928-75-0x0000000000400000-0x0000000000427000-memory.dmp

                                                                                                          Filesize

                                                                                                          156KB

                                                                                                        • memory/928-49-0x0000000000400000-0x0000000000427000-memory.dmp

                                                                                                          Filesize

                                                                                                          156KB

                                                                                                        • memory/928-48-0x0000000000400000-0x0000000000427000-memory.dmp

                                                                                                          Filesize

                                                                                                          156KB

                                                                                                        • memory/928-42-0x0000000000400000-0x0000000000427000-memory.dmp

                                                                                                          Filesize

                                                                                                          156KB

                                                                                                        • memory/928-43-0x0000000000400000-0x0000000000427000-memory.dmp

                                                                                                          Filesize

                                                                                                          156KB

                                                                                                        • memory/1104-74-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                          Filesize

                                                                                                          328KB

                                                                                                        • memory/1116-8-0x0000000000400000-0x00000000004CF000-memory.dmp

                                                                                                          Filesize

                                                                                                          828KB

                                                                                                        • memory/1116-1-0x0000000000400000-0x00000000004CF000-memory.dmp

                                                                                                          Filesize

                                                                                                          828KB

                                                                                                        • memory/1116-0-0x0000000000400000-0x00000000004CF000-memory.dmp

                                                                                                          Filesize

                                                                                                          828KB

                                                                                                        • memory/1116-263-0x0000000000400000-0x00000000004CF000-memory.dmp

                                                                                                          Filesize

                                                                                                          828KB

                                                                                                        • memory/1116-50-0x0000000000400000-0x00000000004CF000-memory.dmp

                                                                                                          Filesize

                                                                                                          828KB

                                                                                                        • memory/1116-7-0x0000000000400000-0x00000000004CF000-memory.dmp

                                                                                                          Filesize

                                                                                                          828KB

                                                                                                        • memory/1116-5-0x0000000000400000-0x00000000004CF000-memory.dmp

                                                                                                          Filesize

                                                                                                          828KB

                                                                                                        • memory/1504-6-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                                                          Filesize

                                                                                                          124KB

                                                                                                        • memory/1584-726-0x0000000004D40000-0x0000000004D41000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/2124-579-0x00000225A7480000-0x00000225A74A0000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/2124-588-0x00000225A7440000-0x00000225A7460000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/2124-574-0x00000225A6400000-0x00000225A6500000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/2124-575-0x00000225A6400000-0x00000225A6500000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/2124-611-0x00000225A7850000-0x00000225A7870000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/2316-47-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                          Filesize

                                                                                                          120KB

                                                                                                        • memory/2920-878-0x0000000004710000-0x0000000004711000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/3292-420-0x0000000004E30000-0x0000000004E31000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/3384-427-0x000001781BC40000-0x000001781BC60000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/3384-453-0x000001781C000000-0x000001781C020000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/3384-440-0x000001781BC00000-0x000001781BC20000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/3384-422-0x000001781AB00000-0x000001781AC00000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/3756-152-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                          Filesize

                                                                                                          328KB

                                                                                                        • memory/3756-76-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                          Filesize

                                                                                                          328KB

                                                                                                        • memory/3756-257-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                          Filesize

                                                                                                          328KB

                                                                                                        • memory/4020-307-0x0000021067DD0000-0x0000021067DF0000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/4020-271-0x0000021066A00000-0x0000021066B00000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/4020-276-0x0000021067A00000-0x0000021067A20000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/4020-272-0x0000021066A00000-0x0000021066B00000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/4020-291-0x00000210679C0000-0x00000210679E0000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/4240-150-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                          Filesize

                                                                                                          328KB

                                                                                                        • memory/4256-572-0x0000000004250000-0x0000000004251000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/4492-269-0x00000000029F0000-0x00000000029F1000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB