Analysis

  • max time kernel
    80s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-01-2025 08:11

General

  • Target

    JaffaCakes118_33d44212038eff8013d649cae7aa9253.exe

  • Size

    174KB

  • MD5

    33d44212038eff8013d649cae7aa9253

  • SHA1

    2aeb195ebfde711b1301cc9e8d7f6e9ef3ad7d87

  • SHA256

    99c86fe1943b34d49b98f320082bcc9be8e9a0a24280ea5bdf839c724b2b8f86

  • SHA512

    9e56e49329da0057ff9229835c681a86769548389823824c701411cc9a05ed1971c88fe8723fd55d4b6727a06e9f7f9a9940971317381c758e35cfdbc75681cc

  • SSDEEP

    3072:c65j3B+CNfYzPvvZ88gCH+S5/946iRBbs7qe756xNcvCupCkkYbJKog6NSLkVF1H:cS2zvZ8z43wRBbsGky7zsVF1IL+tWB

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 7 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies security service 2 TTPs 1 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 9 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables taskbar notifications via registry modification
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 18 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_33d44212038eff8013d649cae7aa9253.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_33d44212038eff8013d649cae7aa9253.exe"
    1⤵
    • Modifies security service
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:868
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_33d44212038eff8013d649cae7aa9253.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_33d44212038eff8013d649cae7aa9253.exe startC:\Users\Admin\AppData\Roaming\9C862\98442.exe%C:\Users\Admin\AppData\Roaming\9C862
      2⤵
        PID:3132
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_33d44212038eff8013d649cae7aa9253.exe
        C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_33d44212038eff8013d649cae7aa9253.exe startC:\Program Files (x86)\627D1\lvvm.exe%C:\Program Files (x86)\627D1
        2⤵
          PID:2556
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1240
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1400
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:4792
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2856
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:3696
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3688
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:4908
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2928
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:3904
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:1004
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of SendNotifyMessage
        PID:996
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:1400
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:244
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        PID:3040
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:2568
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:1004
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:3112
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:3460
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        PID:3600
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:5048
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:212
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Modifies registry class
        PID:3332
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
          PID:3364
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
            PID:4552
          • C:\Windows\explorer.exe
            explorer.exe
            1⤵
              PID:5016
            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
              1⤵
                PID:424
              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                1⤵
                  PID:5088
                • C:\Windows\explorer.exe
                  explorer.exe
                  1⤵
                    PID:3148
                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                    1⤵
                      PID:3332
                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                      1⤵
                        PID:824
                      • C:\Windows\explorer.exe
                        explorer.exe
                        1⤵
                          PID:2592
                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                          1⤵
                            PID:2252
                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                            1⤵
                              PID:1472
                            • C:\Windows\explorer.exe
                              explorer.exe
                              1⤵
                                PID:3944
                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                1⤵
                                  PID:1920
                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                  1⤵
                                    PID:224
                                  • C:\Windows\explorer.exe
                                    explorer.exe
                                    1⤵
                                      PID:4068
                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                      1⤵
                                        PID:4600
                                      • C:\Windows\explorer.exe
                                        explorer.exe
                                        1⤵
                                          PID:3824
                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                          1⤵
                                            PID:4276
                                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                            1⤵
                                              PID:4408
                                            • C:\Windows\explorer.exe
                                              explorer.exe
                                              1⤵
                                                PID:3196
                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                1⤵
                                                  PID:4564
                                                • C:\Windows\explorer.exe
                                                  explorer.exe
                                                  1⤵
                                                    PID:5108
                                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                    1⤵
                                                      PID:3864
                                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                      1⤵
                                                        PID:1004
                                                      • C:\Windows\explorer.exe
                                                        explorer.exe
                                                        1⤵
                                                          PID:4480
                                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                          1⤵
                                                            PID:1448
                                                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                            1⤵
                                                              PID:4796
                                                            • C:\Windows\explorer.exe
                                                              explorer.exe
                                                              1⤵
                                                                PID:3816
                                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                1⤵
                                                                  PID:4696
                                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                  1⤵
                                                                    PID:1280
                                                                  • C:\Windows\explorer.exe
                                                                    explorer.exe
                                                                    1⤵
                                                                      PID:2988
                                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                      1⤵
                                                                        PID:2364
                                                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                        1⤵
                                                                          PID:424
                                                                        • C:\Windows\explorer.exe
                                                                          explorer.exe
                                                                          1⤵
                                                                            PID:632
                                                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                            1⤵
                                                                              PID:4336
                                                                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                              1⤵
                                                                                PID:3040

                                                                              Network

                                                                              MITRE ATT&CK Enterprise v15

                                                                              Replay Monitor

                                                                              Loading Replay Monitor...

                                                                              Downloads

                                                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

                                                                                Filesize

                                                                                471B

                                                                                MD5

                                                                                cf29ae7a78bc6f218b3949b475c975d8

                                                                                SHA1

                                                                                1650ab0f5ab93f946f738ff612c1e29d0d86fdcf

                                                                                SHA256

                                                                                f9736fb4d8c3da34c4453b26e88b6438523fd82bf794da909d9494e3759cf4e7

                                                                                SHA512

                                                                                7520cef2f9400763c54c4f7eb95e1c051992156f7d4250988d105cd8682cf659e703bd71c297489d41ed5b542be20d300fe2020ed57c65cff88c0e6a26e525a5

                                                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

                                                                                Filesize

                                                                                412B

                                                                                MD5

                                                                                8f77273b81685435176240d1efe9756b

                                                                                SHA1

                                                                                f1af6f862752bf3f869b0d19be6ab781f42fab0b

                                                                                SHA256

                                                                                c35df75018f70fcec5bc8ad40ef0540219ee84a43c7685950c59457e7f253e47

                                                                                SHA512

                                                                                a1736f1782c477bd00af82b86c907fd2a992e3b999bef4404f8b6870e6c66c7d6833653ef9226b776c9a71d7dde48cc4b1a6e3de5470031d50f6384203f6572a

                                                                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres

                                                                                Filesize

                                                                                2KB

                                                                                MD5

                                                                                1924a7ba5f31deddd9f29ce3310508de

                                                                                SHA1

                                                                                23fca08113ea630e28d1449e5a9cafde4e5f3c35

                                                                                SHA256

                                                                                09599064a245ac134c27464914d8e22372b3fb775740b2c243ec842812d6b458

                                                                                SHA512

                                                                                0697eccea83cee31dbb47a972efc4e1cec43b0518bb558a1c27985de66c6d8d67705a3a5633e3af21657566935864675c03de95ab05e43cce95de9e7aee01d58

                                                                              • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\2C1DWAXK\microsoft.windows[1].xml

                                                                                Filesize

                                                                                96B

                                                                                MD5

                                                                                e348d00fe7b19d8e8f6efc5cd8f3be59

                                                                                SHA1

                                                                                de85b87da07da2e4b4215ef312d318f1b329ca6e

                                                                                SHA256

                                                                                4ee26da36e3b7d5c9f14f2ed8d6c75c10434acec949dc6e550f176b9acb84dd7

                                                                                SHA512

                                                                                a0a9a671e08cb35904098426cf1b50a11d6a0c7be57f684f9808f5c953ac2732dd1f090c3d12260870056a1ee5f9097ad9872715c798fba196d7212a536afcbe

                                                                              • C:\Users\Admin\AppData\Roaming\9C862\27D1.C86

                                                                                Filesize

                                                                                1KB

                                                                                MD5

                                                                                9a2ede8b187ba0dcf8d8ee84e838c075

                                                                                SHA1

                                                                                1322d0aee90b3c409f1765511600eafe8c24a9ea

                                                                                SHA256

                                                                                07c7f88a5d53d0f92375f2532e8a38e7f9f8ae45e9c4e6a48fb8cef5f365f104

                                                                                SHA512

                                                                                2bbc4e0feab81eefcc1b41f4414711427bb21ee673a1494110d4ac3201e62bb8043d1e15eb4c4516643b18545d943a3b33f1fe6aa2bbae5fa130555f7910c744

                                                                              • C:\Users\Admin\AppData\Roaming\9C862\27D1.C86

                                                                                Filesize

                                                                                600B

                                                                                MD5

                                                                                fcffec5c06e52f31432a630b31f46f73

                                                                                SHA1

                                                                                4784e208ba6b207925d944465af03f2eafcaa8c4

                                                                                SHA256

                                                                                10eaf65d73af474842e0ee074e689f70341a20a4e884e5d97b43bb519cf12b1e

                                                                                SHA512

                                                                                b70d8854a11978d2041fa4737ce186c01850d6f78d406321bb4b5bbf6a21e2d85000b87b6d88ba89ad8404aeac740d42cd096a2c66346b03f65c820956e55cd0

                                                                              • C:\Users\Admin\AppData\Roaming\9C862\27D1.C86

                                                                                Filesize

                                                                                1KB

                                                                                MD5

                                                                                b242a0f77b18033f5dfafa527b7404be

                                                                                SHA1

                                                                                a47d327dcf3b824292c744e17671dfbb729ef8cb

                                                                                SHA256

                                                                                308d318ef0dc4ae3301578513179e975a506ef80348ed64a608362bdf3715e4b

                                                                                SHA512

                                                                                2a0fbfc1450a45f8f77f85720267a77efc28dc6cffde6927bfbf61f7f336804d4fde3488117b6d53b04bc6d914c0b9017a3c1f913937124c775c7056451cc7e4

                                                                              • C:\Users\Admin\AppData\Roaming\9C862\27D1.C86

                                                                                Filesize

                                                                                996B

                                                                                MD5

                                                                                d850bc7a4fe279313353a6700ee37d60

                                                                                SHA1

                                                                                1ace50ecc4eebd3283408f77c6e78309e1b1c45e

                                                                                SHA256

                                                                                dbf8705f0c5faddceafc28b125e84b09e78268342a81b1b5d1946f7709cca3e1

                                                                                SHA512

                                                                                151897edcce9a1575cbfced2c8e02599d60f819387b087036e060ea37d0dfe96e4c9b60479999d482509f5b07e6427de13bec10552efa8567cdb7b8548b78d36

                                                                              • memory/212-643-0x000002D821DC0000-0x000002D821DE0000-memory.dmp

                                                                                Filesize

                                                                                128KB

                                                                              • memory/212-653-0x000002D821D80000-0x000002D821DA0000-memory.dmp

                                                                                Filesize

                                                                                128KB

                                                                              • memory/212-666-0x000002D822190000-0x000002D8221B0000-memory.dmp

                                                                                Filesize

                                                                                128KB

                                                                              • memory/212-638-0x000002D820B00000-0x000002D820C00000-memory.dmp

                                                                                Filesize

                                                                                1024KB

                                                                              • memory/212-639-0x000002D820B00000-0x000002D820C00000-memory.dmp

                                                                                Filesize

                                                                                1024KB

                                                                              • memory/244-349-0x00000231EA900000-0x00000231EAA00000-memory.dmp

                                                                                Filesize

                                                                                1024KB

                                                                              • memory/244-348-0x00000231EA900000-0x00000231EAA00000-memory.dmp

                                                                                Filesize

                                                                                1024KB

                                                                              • memory/244-347-0x00000231EA900000-0x00000231EAA00000-memory.dmp

                                                                                Filesize

                                                                                1024KB

                                                                              • memory/244-376-0x00000231EBDA0000-0x00000231EBDC0000-memory.dmp

                                                                                Filesize

                                                                                128KB

                                                                              • memory/244-364-0x00000231EB990000-0x00000231EB9B0000-memory.dmp

                                                                                Filesize

                                                                                128KB

                                                                              • memory/244-352-0x00000231EB9D0000-0x00000231EB9F0000-memory.dmp

                                                                                Filesize

                                                                                128KB

                                                                              • memory/824-1095-0x00000228CC6A0000-0x00000228CC6C0000-memory.dmp

                                                                                Filesize

                                                                                128KB

                                                                              • memory/824-1084-0x00000228CC090000-0x00000228CC0B0000-memory.dmp

                                                                                Filesize

                                                                                128KB

                                                                              • memory/824-1077-0x00000228CC0D0000-0x00000228CC0F0000-memory.dmp

                                                                                Filesize

                                                                                128KB

                                                                              • memory/824-1072-0x00000228CB170000-0x00000228CB270000-memory.dmp

                                                                                Filesize

                                                                                1024KB

                                                                              • memory/868-15-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                Filesize

                                                                                328KB

                                                                              • memory/868-12-0x0000000000400000-0x000000000044F000-memory.dmp

                                                                                Filesize

                                                                                316KB

                                                                              • memory/868-82-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                Filesize

                                                                                328KB

                                                                              • memory/868-146-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                Filesize

                                                                                328KB

                                                                              • memory/868-2-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                Filesize

                                                                                328KB

                                                                              • memory/868-488-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                Filesize

                                                                                328KB

                                                                              • memory/868-1-0x0000000000400000-0x000000000044F000-memory.dmp

                                                                                Filesize

                                                                                316KB

                                                                              • memory/996-345-0x00000000045B0000-0x00000000045B1000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/1004-491-0x0000000004500000-0x0000000004501000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/1004-234-0x000002994CA20000-0x000002994CA40000-memory.dmp

                                                                                Filesize

                                                                                128KB

                                                                              • memory/1004-198-0x000002994B620000-0x000002994B720000-memory.dmp

                                                                                Filesize

                                                                                1024KB

                                                                              • memory/1004-203-0x000002994C660000-0x000002994C680000-memory.dmp

                                                                                Filesize

                                                                                128KB

                                                                              • memory/1004-213-0x000002994C620000-0x000002994C640000-memory.dmp

                                                                                Filesize

                                                                                128KB

                                                                              • memory/1472-1215-0x0000021153300000-0x0000021153400000-memory.dmp

                                                                                Filesize

                                                                                1024KB

                                                                              • memory/2556-81-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                Filesize

                                                                                328KB

                                                                              • memory/2556-80-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                Filesize

                                                                                328KB

                                                                              • memory/2592-1213-0x0000000004C50000-0x0000000004C51000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/2928-197-0x0000000004420000-0x0000000004421000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/3132-13-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                Filesize

                                                                                328KB

                                                                              • memory/3148-1070-0x00000000034F0000-0x00000000034F1000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/3332-779-0x0000000003EB0000-0x0000000003EB1000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/3460-492-0x000002339E750000-0x000002339E850000-memory.dmp

                                                                                Filesize

                                                                                1024KB

                                                                              • memory/3460-523-0x000002339FC80000-0x000002339FCA0000-memory.dmp

                                                                                Filesize

                                                                                128KB

                                                                              • memory/3460-493-0x000002339E750000-0x000002339E850000-memory.dmp

                                                                                Filesize

                                                                                1024KB

                                                                              • memory/3460-510-0x000002339F870000-0x000002339F890000-memory.dmp

                                                                                Filesize

                                                                                128KB

                                                                              • memory/3460-497-0x000002339F8B0000-0x000002339F8D0000-memory.dmp

                                                                                Filesize

                                                                                128KB

                                                                              • memory/3600-636-0x00000000048E0000-0x00000000048E1000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/4552-818-0x00000230BCEA0000-0x00000230BCEC0000-memory.dmp

                                                                                Filesize

                                                                                128KB

                                                                              • memory/4552-786-0x00000230BC8C0000-0x00000230BC8E0000-memory.dmp

                                                                                Filesize

                                                                                128KB

                                                                              • memory/4552-794-0x00000230BC880000-0x00000230BC8A0000-memory.dmp

                                                                                Filesize

                                                                                128KB

                                                                              • memory/4552-782-0x00000230BB960000-0x00000230BBA60000-memory.dmp

                                                                                Filesize

                                                                                1024KB

                                                                              • memory/4552-781-0x00000230BB960000-0x00000230BBA60000-memory.dmp

                                                                                Filesize

                                                                                1024KB

                                                                              • memory/5016-929-0x0000000004780000-0x0000000004781000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/5088-951-0x00000212B1770000-0x00000212B1790000-memory.dmp

                                                                                Filesize

                                                                                128KB

                                                                              • memory/5088-943-0x00000212B1360000-0x00000212B1380000-memory.dmp

                                                                                Filesize

                                                                                128KB

                                                                              • memory/5088-935-0x00000212B13A0000-0x00000212B13C0000-memory.dmp

                                                                                Filesize

                                                                                128KB

                                                                              • memory/5088-931-0x00000212B0240000-0x00000212B0340000-memory.dmp

                                                                                Filesize

                                                                                1024KB

                                                                              • memory/5088-930-0x00000212B0240000-0x00000212B0340000-memory.dmp

                                                                                Filesize

                                                                                1024KB