Analysis

  • max time kernel
    86s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/01/2025, 02:18

General

  • Target

    JaffaCakes118_9d0eef2535744a9b5f555857fa0df23d.exe

  • Size

    667KB

  • MD5

    9d0eef2535744a9b5f555857fa0df23d

  • SHA1

    a62c6bec2e70fef58ef582c68a918dc2e7584377

  • SHA256

    29b4c6d62bf72822dacdd71fe0819589e0027a23ff0a6c4d432dc93682ac4352

  • SHA512

    c1a651f5aabbdaead95f7b7a17895f4d4266e3758c62c28c599c55327325489ff8736830154a6e054099c4510c8d7a161204a38ffad08dd6cf105620f2206114

  • SSDEEP

    12288:WbMqm6EEb4E9F/ATyGv4XKGQi2lJLm1Giizl6oAlpxElrW1A:WIoEEb4Ev/ATEXKGVnGTzpA1Ec1A

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modifies security service 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modiloader family
  • ModiLoader Second Stage 7 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 11 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables taskbar notifications via registry modification
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 18 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d0eef2535744a9b5f555857fa0df23d.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d0eef2535744a9b5f555857fa0df23d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3992
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d0eef2535744a9b5f555857fa0df23d.exe
      JaffaCakes118_9d0eef2535744a9b5f555857fa0df23d.exe
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Users\Admin\DV245F.exe
        C:\Users\Admin\DV245F.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4140
        • C:\Users\Admin\gcqor.exe
          "C:\Users\Admin\gcqor.exe"
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4808
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c tasklist&&del DV245F.exe
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2404
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            5⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:3088
      • C:\Users\Admin\aohost.exe
        C:\Users\Admin\aohost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4304
        • C:\Users\Admin\aohost.exe
          aohost.exe
          4⤵
          • Executes dropped EXE
          • Maps connected drives based on registry
          • Suspicious behavior: EnumeratesProcesses
          PID:968
      • C:\Users\Admin\bohost.exe
        C:\Users\Admin\bohost.exe
        3⤵
        • Modifies security service
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:956
        • C:\Users\Admin\bohost.exe
          C:\Users\Admin\bohost.exe startC:\Users\Admin\AppData\Roaming\53135\BAF6A.exe%C:\Users\Admin\AppData\Roaming\53135
          4⤵
          • Executes dropped EXE
          PID:4436
        • C:\Users\Admin\bohost.exe
          C:\Users\Admin\bohost.exe startC:\Program Files (x86)\3597D\lvvm.exe%C:\Program Files (x86)\3597D
          4⤵
          • Executes dropped EXE
          PID:1100
      • C:\Users\Admin\dohost.exe
        C:\Users\Admin\dohost.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:5056
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c tasklist&&del JaffaCakes118_9d0eef2535744a9b5f555857fa0df23d.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4980
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          4⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4944
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4128
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3720
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1864
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3576
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2312
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4484
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4252
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4260
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of SendNotifyMessage
    PID:1028
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3824
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3532
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:1964
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2324
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2360
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    PID:4980
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:452
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3440
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:3784
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1948
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3064
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:5036
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2448
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3600
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:2092
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:224
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:788
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:1100
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2136
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4092
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:3448
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4028
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3620
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
      PID:216
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
        PID:4568
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
          PID:8
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
            PID:3480
          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
            1⤵
              PID:3536
            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
              1⤵
                PID:3648
              • C:\Windows\explorer.exe
                explorer.exe
                1⤵
                  PID:1864
                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                  1⤵
                    PID:3896
                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                    1⤵
                      PID:1404
                    • C:\Windows\explorer.exe
                      explorer.exe
                      1⤵
                        PID:2724
                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                        1⤵
                          PID:4780
                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                          1⤵
                            PID:5116
                          • C:\Windows\explorer.exe
                            explorer.exe
                            1⤵
                              PID:5092
                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                              1⤵
                                PID:4076
                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                1⤵
                                  PID:2288
                                • C:\Windows\explorer.exe
                                  explorer.exe
                                  1⤵
                                    PID:4192
                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                    1⤵
                                      PID:2164
                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                      1⤵
                                        PID:1344
                                      • C:\Windows\explorer.exe
                                        explorer.exe
                                        1⤵
                                          PID:3404
                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                          1⤵
                                            PID:3828
                                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                            1⤵
                                              PID:3924
                                            • C:\Windows\explorer.exe
                                              explorer.exe
                                              1⤵
                                                PID:720
                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                1⤵
                                                  PID:1272
                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                  1⤵
                                                    PID:1100
                                                  • C:\Windows\explorer.exe
                                                    explorer.exe
                                                    1⤵
                                                      PID:3452
                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                      1⤵
                                                        PID:316
                                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                        1⤵
                                                          PID:1140
                                                        • C:\Windows\explorer.exe
                                                          explorer.exe
                                                          1⤵
                                                            PID:3444
                                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                            1⤵
                                                              PID:4024
                                                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                              1⤵
                                                                PID:1616
                                                              • C:\Windows\explorer.exe
                                                                explorer.exe
                                                                1⤵
                                                                  PID:1140
                                                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                  1⤵
                                                                    PID:1128
                                                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                    1⤵
                                                                      PID:2688
                                                                    • C:\Windows\explorer.exe
                                                                      explorer.exe
                                                                      1⤵
                                                                        PID:3148
                                                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                        1⤵
                                                                          PID:3804
                                                                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                          1⤵
                                                                            PID:2136

                                                                          Network

                                                                          MITRE ATT&CK Enterprise v15

                                                                          Replay Monitor

                                                                          Loading Replay Monitor...

                                                                          Downloads

                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

                                                                            Filesize

                                                                            471B

                                                                            MD5

                                                                            c01e07f7e6f2bc5c88a8299eeaced5d6

                                                                            SHA1

                                                                            6ca90ef25608d2047ad49bdd0cf64a4d31540580

                                                                            SHA256

                                                                            ded826dcf94f462bd7407f3db45687dcbb3e413fab40fb583ea036c2e4f985a8

                                                                            SHA512

                                                                            01f5dd7ad2bbc61104794360d8b319eea515a6bde4e531b59a5e9ad7a158f781d469a3d540379f3f122a3f2658b5ce4e2d153d32e23be64a3ce899d94f4fe0f0

                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

                                                                            Filesize

                                                                            412B

                                                                            MD5

                                                                            014776f1864eaea854b74f3026ebfddc

                                                                            SHA1

                                                                            c6cfea04152c71c60c821f0cc36a70a7a77524bd

                                                                            SHA256

                                                                            b97b65412ae9d47f83fc7d5e5b2872d3d45bbebab71309d54d228d994de40e97

                                                                            SHA512

                                                                            ca383c980cc4d83803fc01c5b195eb40dbe2dbeec3e3c601e2f315c0eeaad67ba17246ba3ecc44cbd2c220da7f28aad745888fbbb822e687596210059972df8d

                                                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres

                                                                            Filesize

                                                                            2KB

                                                                            MD5

                                                                            e396cd1c0f3c505eb38226d92a144278

                                                                            SHA1

                                                                            96c21d512005a4ac74abe4f9a5e7b4b497381e89

                                                                            SHA256

                                                                            e3d19e9d3fd310c2c10259680324dada1f2fb2ad532076e64f5d9c94af72946a

                                                                            SHA512

                                                                            6b1d4a50cbf1a387b21ebcfa46d05ed62db658370bb4b8ee9a8f14252491cc5f15d3a6d49845cf80eb78a411706e1616193bb4486316d9b2198cf518f42b8429

                                                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\80AM9X7C\microsoft.windows[1].xml

                                                                            Filesize

                                                                            96B

                                                                            MD5

                                                                            c839a1973d3feaead377ea2dad131fe6

                                                                            SHA1

                                                                            252758616792b9b2f10bc460c84b1c1eba75ea04

                                                                            SHA256

                                                                            efecd8d483398a6cb569af17e66cb0ba1ca4b9c65f4a697fc7642cc007fc3ccd

                                                                            SHA512

                                                                            fee6ca3d2ae272b0f1f291e98830215f2ac138747651be78325ab7c1ba3f01f72cbfed4c886853caba45f16c59c78543a87a5f872b2c1f85bffa3a4e11bf50e1

                                                                          • C:\Users\Admin\AppData\Roaming\53135\597D.313

                                                                            Filesize

                                                                            996B

                                                                            MD5

                                                                            13f1e59dce852ac66099745400f0316e

                                                                            SHA1

                                                                            516bc979a40076e500d9c7a77c672d8d8b33e930

                                                                            SHA256

                                                                            9677a05bd58228cdbe082851b76a3cf8bbc4ddbc78b716d56a6f6b38072cf0be

                                                                            SHA512

                                                                            ecc9328702b2ad73ef1226afccbb06b00320e16a502af49550217cb327e7668ac2d2b3c7ad626ddad0b2c991d95fad94544a2f8627d2401758943b6a4830ad29

                                                                          • C:\Users\Admin\AppData\Roaming\53135\597D.313

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            c55ae2227316e8d6e8ef1ed13149292d

                                                                            SHA1

                                                                            8f3f2cf7c2efe9257e285863e3da371adc98a406

                                                                            SHA256

                                                                            bf11e8e5542e5cba548ed57f48d877d2f4a8704b2f0934d031788c574706a147

                                                                            SHA512

                                                                            b28ffb518b69b849f67a756e3a17dc2f2eea5957de25d18bc466441b8faac47c1de5966c589e4caec8643d1cb6e7a7f4f6422d5460b0c2c73463d43d49e2aaef

                                                                          • C:\Users\Admin\AppData\Roaming\53135\597D.313

                                                                            Filesize

                                                                            600B

                                                                            MD5

                                                                            a53e934f1eed6b834b6efe2c832dca52

                                                                            SHA1

                                                                            d6a33e175df4498d9b2ae5fb7cb334694072fe97

                                                                            SHA256

                                                                            8406a65d15f76e72dec92102dd9aa814365e5e261d487e49604a2020cee13554

                                                                            SHA512

                                                                            2f348189745abd01c8e1cf1b053259b36735dae59fc2310b18418a5ba33fd8cbc1af83115ac717b23edb30241d783dba186ac269a4d846dbc8a940e955cc1a30

                                                                          • C:\Users\Admin\DV245F.exe

                                                                            Filesize

                                                                            216KB

                                                                            MD5

                                                                            00b1af88e176b5fdb1b82a38cfdce35b

                                                                            SHA1

                                                                            c0f77262df92698911e0ac2f7774e93fc6b06280

                                                                            SHA256

                                                                            50f026d57fea9c00d49629484442ea59cccc0053d7db73168d68544a3bbf6f59

                                                                            SHA512

                                                                            9e55e7c440af901f9c6d0cdae619f6e964b9b75c9351c76ea64362ff161c150b12a1caabb3d2eb63353a59ae70e7159ca6b3793ed0cc11994766846ac316107f

                                                                          • C:\Users\Admin\aohost.exe

                                                                            Filesize

                                                                            152KB

                                                                            MD5

                                                                            4401958b004eb197d4f0c0aaccee9a18

                                                                            SHA1

                                                                            50e600f7c5c918145c5a270b472b114faa72a971

                                                                            SHA256

                                                                            4c477ed134bc76fa7b912f1aad5e59d4f56f993baa16646e25fec2fdeed3bd8b

                                                                            SHA512

                                                                            f0548bdaafce2cde2f9d3bd1c26ed3c8e9321ef6d706bd372e18886d834828e5bb54ae44f19764e94574ceb4a1a2a99bdd8476e174b05114fcac9a6d4a2d58e6

                                                                          • C:\Users\Admin\bohost.exe

                                                                            Filesize

                                                                            173KB

                                                                            MD5

                                                                            0578a41258df62b7b4320ceaafedde53

                                                                            SHA1

                                                                            50e7c0b00f8f1e5355423893f10ae8ee844d70f4

                                                                            SHA256

                                                                            18941e3030ef70437a5330e4689ec262f887f6f6f1da1cd66c0cbae2a76e75bf

                                                                            SHA512

                                                                            5870a73798bad1f92b4d79f20bf618112ec8917574f6b25ab968c47afff419a829eef57b0282fb4c53e6e636436c8cf52a01426c46bdd4a0ea948d371f0feb09

                                                                          • C:\Users\Admin\dohost.exe

                                                                            Filesize

                                                                            24KB

                                                                            MD5

                                                                            d7390e209a42ea46d9cbfc5177b8324e

                                                                            SHA1

                                                                            eff57330de49be19d2514dd08e614afc97b061d2

                                                                            SHA256

                                                                            d2d49c37bdf2313756897245c3050494b39e824af448450eca1c0e83cf95b1e5

                                                                            SHA512

                                                                            de0eb11dd20cd9d74f47b138fb4189a299a57173fe2635150045b01629354f35b26e0575acd25501403af0db238a123b2e5a79582b47aee1d6e786f5eec1929d

                                                                          • C:\Users\Admin\gcqor.exe

                                                                            Filesize

                                                                            216KB

                                                                            MD5

                                                                            e8bddb7c99f10884a4840b5c633d6a8b

                                                                            SHA1

                                                                            7d0e42b67bac70449cd0cb3de031a2ac6c180135

                                                                            SHA256

                                                                            634677087f39c67c9fafd1d7d1a283adbaa8c9183721899e75fc4f178eef731d

                                                                            SHA512

                                                                            a50eca965e5f9dd60edb5eb4d3fe56e35da5be173012cefb0259f551039ce828677609c7ad3b0247f7d58e04393433b5d23fdf9e33d5cb721d09efe6c0d2f1b8

                                                                          • memory/956-237-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                            Filesize

                                                                            328KB

                                                                          • memory/956-140-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                            Filesize

                                                                            328KB

                                                                          • memory/956-76-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                            Filesize

                                                                            328KB

                                                                          • memory/968-49-0x0000000000400000-0x0000000000427000-memory.dmp

                                                                            Filesize

                                                                            156KB

                                                                          • memory/968-75-0x0000000000400000-0x0000000000427000-memory.dmp

                                                                            Filesize

                                                                            156KB

                                                                          • memory/968-47-0x0000000000400000-0x0000000000427000-memory.dmp

                                                                            Filesize

                                                                            156KB

                                                                          • memory/968-43-0x0000000000400000-0x0000000000427000-memory.dmp

                                                                            Filesize

                                                                            156KB

                                                                          • memory/968-42-0x0000000000400000-0x0000000000427000-memory.dmp

                                                                            Filesize

                                                                            156KB

                                                                          • memory/1028-410-0x00000000040D0000-0x00000000040D1000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/1100-138-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                            Filesize

                                                                            328KB

                                                                          • memory/1964-555-0x0000000004F80000-0x0000000004F81000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/2360-593-0x00000214F3900000-0x00000214F3920000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/2360-575-0x00000214F32F0000-0x00000214F3310000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/2360-562-0x00000214F3330000-0x00000214F3350000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/2748-50-0x0000000000400000-0x00000000004CF000-memory.dmp

                                                                            Filesize

                                                                            828KB

                                                                          • memory/2748-8-0x0000000000400000-0x00000000004CF000-memory.dmp

                                                                            Filesize

                                                                            828KB

                                                                          • memory/2748-1-0x0000000000400000-0x00000000004CF000-memory.dmp

                                                                            Filesize

                                                                            828KB

                                                                          • memory/2748-246-0x0000000000400000-0x00000000004CF000-memory.dmp

                                                                            Filesize

                                                                            828KB

                                                                          • memory/2748-4-0x0000000000400000-0x00000000004CF000-memory.dmp

                                                                            Filesize

                                                                            828KB

                                                                          • memory/2748-0-0x0000000000400000-0x00000000004CF000-memory.dmp

                                                                            Filesize

                                                                            828KB

                                                                          • memory/2748-7-0x0000000000400000-0x00000000004CF000-memory.dmp

                                                                            Filesize

                                                                            828KB

                                                                          • memory/2748-6-0x0000000000400000-0x00000000004CF000-memory.dmp

                                                                            Filesize

                                                                            828KB

                                                                          • memory/3064-869-0x0000024BA82A0000-0x0000024BA82C0000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/3064-881-0x0000024BA88C0000-0x0000024BA88E0000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/3064-855-0x0000024BA82E0000-0x0000024BA8300000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/3064-851-0x0000024BA7400000-0x0000024BA7500000-memory.dmp

                                                                            Filesize

                                                                            1024KB

                                                                          • memory/3064-850-0x0000024BA7400000-0x0000024BA7500000-memory.dmp

                                                                            Filesize

                                                                            1024KB

                                                                          • memory/3440-729-0x0000022C45CA0000-0x0000022C45CC0000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/3440-706-0x0000022C456C0000-0x0000022C456E0000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/3440-718-0x0000022C45680000-0x0000022C456A0000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/3440-702-0x0000022C44760000-0x0000022C44860000-memory.dmp

                                                                            Filesize

                                                                            1024KB

                                                                          • memory/3532-411-0x0000027D2AB00000-0x0000027D2AC00000-memory.dmp

                                                                            Filesize

                                                                            1024KB

                                                                          • memory/3532-416-0x0000027D2BDF0000-0x0000027D2BE10000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/3532-413-0x0000027D2AB00000-0x0000027D2AC00000-memory.dmp

                                                                            Filesize

                                                                            1024KB

                                                                          • memory/3532-412-0x0000027D2AB00000-0x0000027D2AC00000-memory.dmp

                                                                            Filesize

                                                                            1024KB

                                                                          • memory/3532-428-0x0000027D2BDB0000-0x0000027D2BDD0000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/3532-448-0x0000027D2C1C0000-0x0000027D2C1E0000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/3784-849-0x0000000004AE0000-0x0000000004AE1000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/3992-5-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                            Filesize

                                                                            124KB

                                                                          • memory/4260-251-0x0000014BDBFF0000-0x0000014BDC0F0000-memory.dmp

                                                                            Filesize

                                                                            1024KB

                                                                          • memory/4260-284-0x0000014BDD3E0000-0x0000014BDD400000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/4260-268-0x0000014BDCDD0000-0x0000014BDCDF0000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/4260-256-0x0000014BDD020000-0x0000014BDD040000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/4304-48-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                            Filesize

                                                                            120KB

                                                                          • memory/4436-74-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                            Filesize

                                                                            328KB

                                                                          • memory/4484-250-0x0000000002A40000-0x0000000002A41000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/4980-700-0x00000000045C0000-0x00000000045C1000-memory.dmp

                                                                            Filesize

                                                                            4KB