Analysis

  • max time kernel
    59s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-01-2025 18:36

General

  • Target

    JaffaCakes118_f4a299dee043b761ebda36a5d846b116.exe

  • Size

    174KB

  • MD5

    f4a299dee043b761ebda36a5d846b116

  • SHA1

    093201cf450cd84edbc1795ae2e10fdeadc4be8d

  • SHA256

    1bd0f6b56b2962c533b700d93d47fd9d6d320068a422be7880b24b0c09eb2e10

  • SHA512

    50e5fa0a1d3fdc1f44a1261b08c88cf61b40aa2f1a91461839f91f6bc87559957bb7c94e11f5f2cdf910b5f9f50774bb899359f0cf213e7591648266a9b06b03

  • SSDEEP

    3072:N86UNmwtv6jXf0N8CeVKaQhcoh/HpDtVqECw6xjgVLLXbUPj4WZ4P2PdQLD/DbQo:ys0CzbRVX0c0/Hpb6wdVLHOf4P2PdKlj

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 7 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies security service 2 TTPs 1 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables taskbar notifications via registry modification
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 14 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f4a299dee043b761ebda36a5d846b116.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f4a299dee043b761ebda36a5d846b116.exe"
    1⤵
    • Modifies security service
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2032
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f4a299dee043b761ebda36a5d846b116.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f4a299dee043b761ebda36a5d846b116.exe startC:\Users\Admin\AppData\Roaming\2402C\BAF6A.exe%C:\Users\Admin\AppData\Roaming\2402C
      2⤵
        PID:2336
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f4a299dee043b761ebda36a5d846b116.exe
        C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f4a299dee043b761ebda36a5d846b116.exe startC:\Program Files (x86)\2C1C9\lvvm.exe%C:\Program Files (x86)\2C1C9
        2⤵
          PID:536
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1304
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1508
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:848
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2416
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:3932
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2100
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SendNotifyMessage
        PID:3956
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:4304
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:5088
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of SendNotifyMessage
        PID:4220
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:2396
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:1076
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:320
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:2028
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:3960
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:2252
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:2268
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:1208
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:1908
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
          PID:4288
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
            PID:3236
          • C:\Windows\explorer.exe
            explorer.exe
            1⤵
              PID:1756
            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
              1⤵
                PID:4640
              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                1⤵
                  PID:5024
                • C:\Windows\explorer.exe
                  explorer.exe
                  1⤵
                    PID:3452
                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                    1⤵
                      PID:4404
                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                      1⤵
                        PID:1584
                      • C:\Windows\explorer.exe
                        explorer.exe
                        1⤵
                          PID:4284
                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                          1⤵
                            PID:4824
                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                            1⤵
                              PID:4100
                            • C:\Windows\explorer.exe
                              explorer.exe
                              1⤵
                                PID:4204
                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                1⤵
                                  PID:1504
                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                  1⤵
                                    PID:5096
                                  • C:\Windows\explorer.exe
                                    explorer.exe
                                    1⤵
                                      PID:2960
                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                      1⤵
                                        PID:3412
                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                        1⤵
                                          PID:2336
                                        • C:\Windows\explorer.exe
                                          explorer.exe
                                          1⤵
                                            PID:4392
                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                            1⤵
                                              PID:3236
                                            • C:\Windows\explorer.exe
                                              explorer.exe
                                              1⤵
                                                PID:1080
                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                1⤵
                                                  PID:752
                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                  1⤵
                                                    PID:2936
                                                  • C:\Windows\explorer.exe
                                                    explorer.exe
                                                    1⤵
                                                      PID:3220
                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                      1⤵
                                                        PID:1348
                                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                        1⤵
                                                          PID:4664
                                                        • C:\Windows\explorer.exe
                                                          explorer.exe
                                                          1⤵
                                                            PID:2736
                                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                            1⤵
                                                              PID:4500
                                                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                              1⤵
                                                                PID:4100
                                                              • C:\Windows\explorer.exe
                                                                explorer.exe
                                                                1⤵
                                                                  PID:1752
                                                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                  1⤵
                                                                    PID:4240
                                                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                    1⤵
                                                                      PID:4332
                                                                    • C:\Windows\explorer.exe
                                                                      explorer.exe
                                                                      1⤵
                                                                        PID:3308
                                                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                        1⤵
                                                                          PID:4364
                                                                        • C:\Windows\explorer.exe
                                                                          explorer.exe
                                                                          1⤵
                                                                            PID:3420
                                                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                            1⤵
                                                                              PID:2268
                                                                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                              1⤵
                                                                                PID:1624
                                                                              • C:\Windows\explorer.exe
                                                                                explorer.exe
                                                                                1⤵
                                                                                  PID:4476
                                                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                  1⤵
                                                                                    PID:5032
                                                                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                    1⤵
                                                                                      PID:928
                                                                                    • C:\Windows\explorer.exe
                                                                                      explorer.exe
                                                                                      1⤵
                                                                                        PID:1016
                                                                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                        1⤵
                                                                                          PID:4396
                                                                                        • C:\Windows\explorer.exe
                                                                                          explorer.exe
                                                                                          1⤵
                                                                                            PID:112
                                                                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                            1⤵
                                                                                              PID:1844
                                                                                            • C:\Windows\explorer.exe
                                                                                              explorer.exe
                                                                                              1⤵
                                                                                                PID:5048
                                                                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                                1⤵
                                                                                                  PID:4232
                                                                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                                  1⤵
                                                                                                    PID:1208

                                                                                                  Network

                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                  Replay Monitor

                                                                                                  Loading Replay Monitor...

                                                                                                  Downloads

                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

                                                                                                    Filesize

                                                                                                    471B

                                                                                                    MD5

                                                                                                    a8b8e97f35e913d8380de208cbae2610

                                                                                                    SHA1

                                                                                                    1ad6c0148e1a302dee28f8171835bc2e9ac81f09

                                                                                                    SHA256

                                                                                                    11851918cc117f9802eb386e3f018460eb49861af54c5797287bca248675bc92

                                                                                                    SHA512

                                                                                                    cb995c892dc668e7b8427f99e3a054218a834fd030eec1660b96a5b12c5518b1dfd8370eea5e7bf09a9dd93caf3b6fc23f6c07269071cab13ba121710f6e5f9b

                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

                                                                                                    Filesize

                                                                                                    412B

                                                                                                    MD5

                                                                                                    9b3121a62303c699430f69b4e1a7e13e

                                                                                                    SHA1

                                                                                                    1b872d273dcfdeb8535020601e31c4590c27d467

                                                                                                    SHA256

                                                                                                    8691728da148676d763c955d35435f979cb9977d129def477031f179cb59bb4f

                                                                                                    SHA512

                                                                                                    b9145d32b2a9448b5f15bda88274cbc935fc6ad590006c4912f12cc244c7eb7b9819cb825f9a206e3892984d848ae01dfc9006ed0f38a1b4fcbf32bdbe4e70e3

                                                                                                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres

                                                                                                    Filesize

                                                                                                    2KB

                                                                                                    MD5

                                                                                                    8b28afe48aca01beeb4d5ddc039fe79f

                                                                                                    SHA1

                                                                                                    e2fa3bc28b9b8615c30a27f346fb3e5f61102696

                                                                                                    SHA256

                                                                                                    0178bbccc9bb210352dc2d2b8774b4b77290a9b54448f5ed5a0424dc2a17bd39

                                                                                                    SHA512

                                                                                                    dd3fea2257ffee8e8da818b6a1fea574d297d93826894a91d57e185d4c8c9aea49df5003a246a42ca19ff1094efd7a57a71844c9dae84bf78d25634f1ae6e307

                                                                                                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133818720934654762.txt

                                                                                                    Filesize

                                                                                                    75KB

                                                                                                    MD5

                                                                                                    3d1cb0f821d2c429ababdd4ec60d02a1

                                                                                                    SHA1

                                                                                                    64bcefdfb6ce47a203b4ad65b2d08bc70631523c

                                                                                                    SHA256

                                                                                                    2dc6c92c29d04c1b29104bff679d42196899ca8a3022f9d2fdbedf058101cf85

                                                                                                    SHA512

                                                                                                    99c1a05f19e87e7c31ef70d873e38ce2607b19f230fad7a9681eb7db8508e3b298111629e5a926157f8fa7f26b6264864bbb1e844c6d53430a4a92c1dd8a0716

                                                                                                  • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\DGTT1KLJ\microsoft.windows[1].xml

                                                                                                    Filesize

                                                                                                    97B

                                                                                                    MD5

                                                                                                    dfc314c564e6dcc3d3d7f1d2cdf01ff5

                                                                                                    SHA1

                                                                                                    53a06942171b8047e4850e459554488280da265e

                                                                                                    SHA256

                                                                                                    56b9785b0255bd668bfdb7d6f789d1e54de550d567b85e52105893b8fbb45a08

                                                                                                    SHA512

                                                                                                    48688def79fffd15cd97505f73860552d7ad5069cd741214ca13225dd69eff4111338175bcb6fc9e1ed926f4bbc11b28865ab3df33aabf8bb7b8b68a0531f5f5

                                                                                                  • C:\Users\Admin\AppData\Roaming\2402C\C1C9.402

                                                                                                    Filesize

                                                                                                    1KB

                                                                                                    MD5

                                                                                                    bc93a042cf3b4f5af5fd338e02ce6b40

                                                                                                    SHA1

                                                                                                    c85c518de44044cf14fbdd84aa435a03d54c1047

                                                                                                    SHA256

                                                                                                    508463b31298ba02367751eb742dcc14b0b627383c279655ce43cd2d88d78cbe

                                                                                                    SHA512

                                                                                                    a0532469a3a7c9ec69e88e0aad801a9a1814b6611607ec12df503ebcbaba3cfa5c817e82fb0c2f14c85b26e0c3beec004f98c29e75260e70319a045d1f7c27c0

                                                                                                  • C:\Users\Admin\AppData\Roaming\2402C\C1C9.402

                                                                                                    Filesize

                                                                                                    600B

                                                                                                    MD5

                                                                                                    506fee9d6c298e929a6c411c8b3cd1c2

                                                                                                    SHA1

                                                                                                    43ce84fc81af0a52dcd61c6e15e181f7c09bffc3

                                                                                                    SHA256

                                                                                                    41305a86aae7cb33a3b5d47f0c861c5b09538327d70a77da016de388986386ef

                                                                                                    SHA512

                                                                                                    e105c4da08437a031e0ace512234a47a71b4aa50cd240bb9db1a11280953d1532731ca128d1ff237bf64ab6b12b72a86812ae0c2d8925fb0a103ff2f26489ab3

                                                                                                  • C:\Users\Admin\AppData\Roaming\2402C\C1C9.402

                                                                                                    Filesize

                                                                                                    996B

                                                                                                    MD5

                                                                                                    f0042570aaf9d50a537bc955fa80327f

                                                                                                    SHA1

                                                                                                    f0da78b0657b28fb7de636691a236f896646c97d

                                                                                                    SHA256

                                                                                                    772a64beb7ff81e4448f177b9eb4f6e5eeb501ab7d5dbcd3ce4342c8c51125d9

                                                                                                    SHA512

                                                                                                    40f859aeec64b5353a95f9d7c55afbe134edefe7811a1245c496fdfc296deaedcc94e298b85582ab62c6067c52978c7b8adb847382d21fd15e5cf07854b9a509

                                                                                                  • memory/320-641-0x00000000050F0000-0x00000000050F1000-memory.dmp

                                                                                                    Filesize

                                                                                                    4KB

                                                                                                  • memory/536-83-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                    Filesize

                                                                                                    328KB

                                                                                                  • memory/1076-500-0x00000291AA460000-0x00000291AA480000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/1076-530-0x00000291AA830000-0x00000291AA850000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/1076-516-0x00000291AA420000-0x00000291AA440000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/1208-821-0x00000289F7000000-0x00000289F7020000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/1208-790-0x00000289F5B00000-0x00000289F5C00000-memory.dmp

                                                                                                    Filesize

                                                                                                    1024KB

                                                                                                  • memory/1208-795-0x00000289F6C40000-0x00000289F6C60000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/1208-791-0x00000289F5B00000-0x00000289F5C00000-memory.dmp

                                                                                                    Filesize

                                                                                                    1024KB

                                                                                                  • memory/1208-808-0x00000289F6C00000-0x00000289F6C20000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/1584-1230-0x0000025BFCA60000-0x0000025BFCA80000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/1584-1226-0x0000025BFB900000-0x0000025BFBA00000-memory.dmp

                                                                                                    Filesize

                                                                                                    1024KB

                                                                                                  • memory/1584-1242-0x0000025BFCA20000-0x0000025BFCA40000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/1584-1253-0x0000025BFCE30000-0x0000025BFCE50000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/1584-1225-0x0000025BFB900000-0x0000025BFBA00000-memory.dmp

                                                                                                    Filesize

                                                                                                    1024KB

                                                                                                  • memory/1756-1083-0x00000000047C0000-0x00000000047C1000-memory.dmp

                                                                                                    Filesize

                                                                                                    4KB

                                                                                                  • memory/1908-930-0x0000000004900000-0x0000000004901000-memory.dmp

                                                                                                    Filesize

                                                                                                    4KB

                                                                                                  • memory/2032-1-0x0000000000400000-0x000000000044F000-memory.dmp

                                                                                                    Filesize

                                                                                                    316KB

                                                                                                  • memory/2032-1222-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                    Filesize

                                                                                                    328KB

                                                                                                  • memory/2032-84-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                    Filesize

                                                                                                    328KB

                                                                                                  • memory/2032-16-0x0000000000400000-0x000000000044F000-memory.dmp

                                                                                                    Filesize

                                                                                                    316KB

                                                                                                  • memory/2032-2-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                    Filesize

                                                                                                    328KB

                                                                                                  • memory/2032-17-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                    Filesize

                                                                                                    328KB

                                                                                                  • memory/2032-158-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                    Filesize

                                                                                                    328KB

                                                                                                  • memory/2100-231-0x00000212DBE70000-0x00000212DBE90000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/2100-200-0x00000212DBAA0000-0x00000212DBAC0000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/2100-197-0x00000212DAB00000-0x00000212DAC00000-memory.dmp

                                                                                                    Filesize

                                                                                                    1024KB

                                                                                                  • memory/2100-210-0x00000212DBA60000-0x00000212DBA80000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/2100-196-0x00000212DAB00000-0x00000212DAC00000-memory.dmp

                                                                                                    Filesize

                                                                                                    1024KB

                                                                                                  • memory/2100-195-0x00000212DAB00000-0x00000212DAC00000-memory.dmp

                                                                                                    Filesize

                                                                                                    1024KB

                                                                                                  • memory/2252-788-0x00000000044A0000-0x00000000044A1000-memory.dmp

                                                                                                    Filesize

                                                                                                    4KB

                                                                                                  • memory/2336-13-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                    Filesize

                                                                                                    328KB

                                                                                                  • memory/2336-12-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                    Filesize

                                                                                                    328KB

                                                                                                  • memory/2336-15-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                    Filesize

                                                                                                    328KB

                                                                                                  • memory/2416-193-0x0000000004360000-0x0000000004361000-memory.dmp

                                                                                                    Filesize

                                                                                                    4KB

                                                                                                  • memory/3236-963-0x0000028271A40000-0x0000028271A60000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/3236-932-0x0000028270520000-0x0000028270620000-memory.dmp

                                                                                                    Filesize

                                                                                                    1024KB

                                                                                                  • memory/3236-938-0x0000028271670000-0x0000028271690000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/3236-948-0x0000028271630000-0x0000028271650000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/3452-1223-0x0000000004850000-0x0000000004851000-memory.dmp

                                                                                                    Filesize

                                                                                                    4KB

                                                                                                  • memory/3956-345-0x0000000004D50000-0x0000000004D51000-memory.dmp

                                                                                                    Filesize

                                                                                                    4KB

                                                                                                  • memory/3960-644-0x0000021937600000-0x0000021937700000-memory.dmp

                                                                                                    Filesize

                                                                                                    1024KB

                                                                                                  • memory/3960-658-0x00000219382E0000-0x0000021938300000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/3960-648-0x0000021938320000-0x0000021938340000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/3960-670-0x0000021938B00000-0x0000021938B20000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/4100-1372-0x000002753C000000-0x000002753C100000-memory.dmp

                                                                                                    Filesize

                                                                                                    1024KB

                                                                                                  • memory/4220-492-0x0000000004AE0000-0x0000000004AE1000-memory.dmp

                                                                                                    Filesize

                                                                                                    4KB

                                                                                                  • memory/4284-1368-0x00000000045C0000-0x00000000045C1000-memory.dmp

                                                                                                    Filesize

                                                                                                    4KB

                                                                                                  • memory/5024-1103-0x000002D4D4DE0000-0x000002D4D4E00000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/5024-1114-0x000002D4D53F0000-0x000002D4D5410000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/5024-1085-0x000002D4D3F00000-0x000002D4D4000000-memory.dmp

                                                                                                    Filesize

                                                                                                    1024KB

                                                                                                  • memory/5024-1090-0x000002D4D5020000-0x000002D4D5040000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/5088-382-0x000001A716950000-0x000001A716970000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/5088-367-0x000001A716540000-0x000001A716560000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/5088-352-0x000001A716580000-0x000001A7165A0000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/5088-347-0x000001A715420000-0x000001A715520000-memory.dmp

                                                                                                    Filesize

                                                                                                    1024KB

                                                                                                  • memory/5088-348-0x000001A715420000-0x000001A715520000-memory.dmp

                                                                                                    Filesize

                                                                                                    1024KB