Analysis
-
max time kernel
133s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
15-02-2025 20:56
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe
Resource
win10v2004-20250207-en
General
-
Target
JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe
-
Size
246KB
-
MD5
fc642b52f11f7857eb4620e8f03add8b
-
SHA1
60d8792f98c93a635cfcc4aee9b6193ed2539310
-
SHA256
00e35387efbeebf214bfb3cf993a1e431e35fb3a41f8700865e0106972ff0a55
-
SHA512
36e4b228ae6d2cb60d8ba479e111fbd533dd4cf31dfa9fd31a6a1af5248184abe470ede1f61f325748a810f4ddc905f85915f252be51a0f43396274e537f2631
-
SSDEEP
6144:o+5oGLScwpDXfwjhWQCqSt3ZIXMBygVxYN7T7:oUDED4jhc3ZIXM5Vx+T7
Malware Config
Extracted
simda
-
dga
cihunemyror.eu
digivehusyd.eu
vofozymufok.eu
fodakyhijyv.eu
nopegymozow.eu
gatedyhavyd.eu
marytymenok.eu
jewuqyjywyv.eu
qeqinuqypoq.eu
kemocujufys.eu
rynazuqihoj.eu
lyvejujolec.eu
tucyguqaciq.eu
xuxusujenes.eu
puzutuqeqij.eu
ciliqikytec.eu
dikoniwudim.eu
vojacikigep.eu
fogeliwokih.eu
nofyjikoxex.eu
gadufiwabim.eu
masisokemep.eu
jepororyrih.eu
qetoqolusex.eu
keraborigin.eu
ryqecolijet.eu
lymylorozig.eu
tunujolavez.eu
xubifaremin.eu
puvopalywet.eu
cicaratupig.eu
dixemazufel.eu
volebatijub.eu
fokyxazolar.eu
nojuletacuf.eu
gahihezenal.eu
magofetequb.eu
jefapexytar.eu
qederepuduf.eu
kepymexihak.eu
rytuvepokuv.eu
lyruxyxaxaw.eu
tuwikypabud.eu
xuqohyxeqak.eu
pumadypyruv.eu
cinepycusaw.eu
divywysigud.eu
vocumucokaj.eu
foxivusozuc.eu
nozoxucavaq.eu
galokusemus.eu
makagucyraj.eu
jejedudupuc.eu
qegytuvufoq.eu
kefuwidijyp.eu
rydinivoloh.eu
lysovidacyx.eu
tupazivenom.eu
xutekidywyp.eu
puregivytoh.eu
ciqydofudyx.eu
dimutobihom.eu
voniqofolyt.eu
fobonobaxog.eu
novacofebyz.eu
gacezobeqon.eu
maxyjofytyt.eu
jeluganusog.eu
qekusagigyz.eu
kejitanokon.eu
ryhoqagoxyr.eu
lygananavof.eu
tufecagemyl.eu
xudylenyrob.eu
pupujeguper.eu
citifemifif.eu
dirosehijel.eu
voworemoziv.eu
foqaqehacew.eu
nomebemenid.eu
ganycyhywek.eu
mavulymupiv.eu
jecijyjudew.eu
qexofyqihid.eu
kezapyjolek.eu
ryleryqacic.eu
lykemujebeq.eu
tujybuqeqis.eu
xuguxujytej.eu
pufiluqudic.eu
cidohukigeq.eu
disafuwokis.eu
vopepukaxej.eu
fotyriwavix.eu
norumikemem.eu
gaquviwyrup.eu
mamixikusah.eu
jenokirifux.eu
qebahilojam.eu
kevedorozup.eu
rycypolavag.eu
lyxuworenuz.eu
tulimolywan.eu
xukovoruput.eu
pujoxolufag.eu
cihakotihuz.eu
digegazolan.eu
vofydatacut.eu
fodutazenaf.eu
nopiwatyqul.eu
gatonazytab.eu
maravatudur.eu
jewezexigaf.eu
qeqekepokul.eu
kemygexaxab.eu
rynudepebur.eu
lyvitexemod.eu
tucoqepyryk.eu
xuxanexusov.eu
puzecypigyw.eu
cilyzycojod.eu
dikujysozyk.eu
vojugycavov.eu
fogisysemyq.eu
nofotycywos.eu
gadaqusupyj.eu
masenucifoc.eu
jepycudijyq.eu
qetuluvolos.eu
kerijudacyj.eu
ryqofuvenoc.eu
lymosudyqym.eu
tunarivutop.eu
xubeqidudyh.eu
puvybivihox.eu
cicucifokym.eu
dixilibaxop.eu
volojifebeh.eu
fokafobeqix.eu
nojepofyren.eu
gaherobusit.eu
magymofigeg.eu
jefubonokiz.eu
qedixogazen.eu
kepolonavit.eu
rytahagemeg.eu
lyrefanyril.eu
tuwypagupeb.eu
xuquranifir.eu
pumumagojef.eu
cinivamolil.eu
divoxehaceb.eu
vocakemenir.eu
foxehehywef.eu
nozydemutik.eu
galupehudev.eu
makiwemihiw.eu
jejomejoled.eu
qegovyqaxuk.eu
kefaxyjebav.eu
rydekyqyquw.eu
lysygyjytad.eu
tupudyqusuj.eu
xutityjigac.eu
purowuqokuq.eu
ciqanukaxas.eu
dimevuwevuj.eu
vonezukemac.eu
fobykuwyruq.eu
novugukupap.eu
gaciduwifuh.eu
maxotikojax.eu
jelaqirozum.eu
qekenilacap.eu
kejycirenuh.eu
ryhuzilywax.eu
lygujirupum.eu
tufigolidat.eu
xudosorihug.eu
pupatololoz.eu
citeqotacyn.eu
dirynozebot.eu
vowucotyqyg.eu
foqilozutoz.eu
nomojatudyn.eu
ganofazigor.eu
mavasatokyf.eu
jeceraxaxol.eu
qexyqapevyb.eu
kezubaxemor.eu
rylicepyryf.eu
lykolexusol.eu
tujajepifyv.eu
xugefexojow.eu
pufepepazyd.eu
cidyrecavok.eu
disumesenyv.eu
vopibycywow.eu
fotoxysupyd.eu
noralycifok.eu
gaqehysohec.eu
mamyfycoliq.eu
jenupydaces.eu
qeburuvenij.eu
kevimudyqec.eu
rycovuvutiq.eu
lyxaxududes.eu
tulekuvigij.eu
xukyhudokex.eu
pujuduvaxim.eu
cihipifebep.eu
digowibymih.eu
vofomifyrex.eu
fodavibusim.eu
nopexifigep.eu
gatykibojig.eu
marugofazez.eu
jewidonevin.eu
qeqotogemet.eu
kemawonywig.eu
rynenogupez.eu
lyvevonifun.eu
tucyzogojat.eu
xuxukanoluf.eu
puzigagacal.eu
cilodamenub.eu
dikatahyqar.eu
vojeqamutuf.eu
fogynahidal.eu
nofucemihub.eu
gaduzehokar.eu
masijemaxud.eu
jepogejebak.eu
qetaseqyquv.eu
keretejuraw.eu
ryqyqequsud.eu
lymunyjigak.eu
tunicyqokuv.eu
xubolyjazaq.eu
puvojyqevus.eu
cicafykemaj.eu
dixesywyruc.eu
volyrukupoq.eu
fokuquwifys.eu
nojibukojoj.eu
gahocuwalyc.eu
magalukacom.eu
jefejurenyp.eu
qedefulywoh.eu
kepypirutyx.eu
ryturilidom.eu
lyrimirohyp.eu
tuwobiloloh.eu
xuqaxiraxyx.eu
pumelilebon.eu
cinyhotyqyt.eu
divufozutog.eu
vocupotusyz.eu
foxirozigon.eu
nozomotokyt.eu
galavozaxog.eu
makexotevyl.eu
jejykaxymob.eu
qeguhapyrer.eu
kefidaxupif.eu
rydopapifel.eu
lysowaxojib.eu
tupamapazer.eu
xutevexecif.eu
puryxepenek.eu
ciqukecywiv.eu
dimigesupew.eu
vonodecidid.eu
fobatesohek.eu
novewecoliv.eu
gacenysacew.eu
maxyvycebid.eu
jeluzydyqej.eu
qekikyvutic.eu
kejogydideq.eu
ryhadyvigis.eu
lygetudokej.eu
tufyquvaxic.eu
xudunudeveq.eu
pupucuvymup.eu
citizufurah.eu
dirojubusux.eu
vowagufifam.eu
foqesibojup.eu
nomytifazah.eu
ganuqibevux.eu
mavinifenam.eu
jecocinywut.eu
qexoligupag.eu
kezajonifuz.eu
rylefogohan.eu
lykysonalut.eu
tujurogacag.eu
xugiqonenuz.eu
pufobogyqan.eu
cidacomutur.eu
diselahidaf.eu
vopejamogul.eu
fotyfahokab.eu
norupamaxur.eu
gaqirahebof.eu
mamomamymyl.eu
jenabejurov.eu
qebexequsyw.eu
kevylejigod.eu
rycuheqojyk.eu
lyxufejazov.eu
tulipeqevyw.eu
xukorejymod.eu
pujamyqywyk.eu
cihevykupoc.eu
digyxywifyq.eu
vofukykojos.eu
fodihywalyj.eu
nopodykecoc.eu
gatopuwenyq.eu
marawukyqos.eu
jewemurutyj.eu
qeqyvulidox.eu
kemuxurohym.eu
rynikulokop.eu
lyvoguraxeh.eu
tucadilebix.eu
xuxetiryqem.eu
puzewilurip.eu
cilynitiseg.eu
dikuvizigiz.eu
vojizitoken.eu
fogokozazit.eu
nofagoteveg.eu
gadedozymiz.eu
masytoturen.eu
jepuqoxupit.eu
qetunopifef.eu
kericoxojil.eu
ryqozapaleb.eu
lymajaxecir.eu
tunegapenef.eu
xubysaxywil.eu
puvutaputeb.eu
ciciqacidir.eu
dixonesohed.eu
volocecaluk.eu
fokalesaxav.eu
nojejecebuw.eu
gahyfesyqad.eu
magusecutuk.eu
jefiredisav.eu
qedoqyvoguq.eu
kepabydokas.eu
rytecyvaxuj.eu
lyrelydevac.eu
tuwyjyvymuq.eu
xuqufyduras.eu
pumipuvupuj.eu
cinorufifac.eu
divamubojum.eu
vocebufazap.eu
foxyxubecuh.eu
nozulufynax.eu
galuhubywum.eu
makififupap.eu
jejopiniduh.eu
qegarigohox.eu
kefeminalyn.eu
rydyvigecot.eu
lysuxinebyg.eu
tupikogyqoz.eu
xutohonutyn.eu
purodogidot.eu
ciqapomogyg.eu
dimewohokol.eu
vonymomaxyb.eu
fobuvohevor.eu
novixamymyf.eu
gacokahurol.eu
maxagamisyb.eu
jeledajifor.eu
qeketaqojyf.eu
kejywajazok.eu
ryhuneqevyv.eu
lygivejynow.eu
tufozequwyd.eu
xudakejupok.eu
pupegeqifev.eu
citydekohiw.eu
dirutewaled.eu
vowuqykecij.eu
foqinywenec.eu
nomocykyqiq.eu
ganazywutes.eu
mavejykidij.eu
jecygyrogec.eu
qexusulakiq.eu
kezituraxep.eu
ryloqulebih.eu
lykonurymex.eu
tujaculurim.eu
xugelurisep.eu
pufyjulogih.eu
cidufitojex.eu
disisizazim.eu
voporitevet.eu
fotaqizymig.eu
norebituwez.eu
gaqecizupun.eu
mamylotifat.eu
jenujoxojug.eu
qebifopalaz.eu
kevopoxecun.eu
rycaropynar.eu
lyxemoxyquf.eu
tulyboputal.eu
xukuxaxidub.eu
pujulapohar.eu
cihihacakuf.eu
digofasexal.eu
vofapacebuv.eu
foderasyqaw.eu
nopymecurud.eu
gatuvesisak.eu
marixecoguv.eu
jewokedokaw.eu
qeqohevazud.eu
kemadedevak.eu
rynepevymuc.eu
lyvywyduroq.eu
tucumyvipys.eu
xuxivydifoj.eu
puzoxyvojyc.eu
cilakyfaloq.eu
dikegybecys.eu
vojedufynoj.eu
fogytubuwyx.eu
nofuwufutom.eu
gadinubidyp.eu
masovufohoh.eu
jepazunalyx.eu
qetekugexom.eu
keryginebyp.eu
ryqudigyqog.eu
lymutinutyz.eu
tuniqigison.eu
xuboninogyt.eu
puvacigakog.eu
cicezomaxyz.eu
dixyjohevon.eu
volugomymet.eu
fokisohurif.eu
nojotomipel.eu
gahoqohofib.eu
maganomojer.eu
jefecajazif.eu
qedylaqecel.eu
kepujajynib.eu
rytifaquwer.eu
lyrosajupid.eu
tuwaraqidek.eu
xuqeqejohiv.eu
pumebeqalew.eu
cinycekecid.eu
divulewybek.eu
vocijekyqiv.eu
foxofewuteq.eu
nozapekidis.eu
galerywogej.eu
makymykakic.eu
jejubyrexeq.eu
qeguxylevus.eu
kefilyrymaj.eu
rydohyluruc.eu
lysafurisam.eu
tupepulofup.eu
xutyrurojah.eu
purumulazux.eu
ciqivutevam.eu
dimoxuzynup.eu
vonokutuwah.eu
fobahizipux.eu
noveditifan.eu
gacypizohut.eu
maxuwitalag.eu
jelimixecuz.eu
qekovipynan.eu
kejaxoxuqut.eu
ryhekoputag.eu
lygegoxidul.eu
tufydopogab.eu
xudutoxakur.eu
pupiwopexof.eu
citonocebyl.eu
diravasymob.eu
vowezacuryr.eu
foqykasisof.eu
nomugacogyk.eu
ganudasajov.eu
mavitacazyw.eu
jecoqedevod.eu
qexanevymyk.eu
kezeceduwov.eu
rylyzevipyw.eu
lykujedofod.eu
tujigevojyj.eu
xugosedaloc.eu
pufotyvecyq.eu
cidaqyfynos.eu
disenybuqyj.eu
vopycyfutoc.eu
fotulybidyq.eu
norijyfohop.eu
gaqofubakeh.eu
mamasufexix.eu
jenerunybem.eu
qebequgyqip.eu
kevybunureh.eu
rycucugisix.eu
lyxilunogem.eu
tulojigakit.eu
xukafinezeg.eu
pujepigeviz.eu
cihyrimymen.eu
digumihurit.eu
vofubimipeg.eu
fodixohofiz.eu
nopolomojen.eu
gatahohalir.eu
marefomecef.eu
jewypojynil.eu
qequroquweb.eu
kemimojitir.eu
rynovaqidef.eu
lyvoxajohul.eu
tucakaqalav.eu
xuxehajexuw.eu
puzydaqybad.eu
cilupakuquk.eu
dikiwewutav.eu
vojomekisuw.eu
fogavewogad.eu
nofexekakuk.eu
gadekewexac.eu
masygekevuq.eu
jepuderymas.eu
qetityluruj.eu
kerowyripac.eu
ryqanylofuq.eu
lymevyrajas.eu
tunyzylazuj.eu
xubukyrecax.eu
puvugulynum.eu
cicidutuwap.eu
dixotuzipuh.eu
volaqutodox.eu
fokenuzohym.eu
nojycutalop.eu
gahuzuzecyg.eu
magijityboz.eu
jefogixuqyn.eu
qedosiputot.eu
kepatixidyg.eu
ryteqipogoz.eu
lyrynixakyn.eu
tuwucopexot.eu
xuqiloxyvyf.eu
pumojopymol.eu
cinafocuryb.eu
divesosisor.eu
vocerocofyf.eu
foxyqosajol.eu
nozubacezyb.eu
galicasevor.eu
makolacynyd.eu
jejajaduwok.eu
qegefavipev.eu
kefypadofiw.eu
rydurevohed.eu
lysumedalik.eu
tupibevecev.eu
xutoxedyniq.eu
puralevuqes.eu
ciqehefitij.eu
dimyfebidec.eu
vonupyfogiq.eu
fobirybakes.eu
novomyfexij.eu
gacovybybec.eu
maxaxyfumim.eu
jelekynurep.eu
qekyhugisih.eu
kejudunogex.eu
ryhipugajim.eu
lygowunezep.eu
tufamugevih.eu
xudevunymex.eu
pupexuguwun.eu
citykimipat.eu
dirugihofug.eu
vowidimajaz.eu
foqotihalun.eu
nomawimecat.eu
ganenihynug.eu
mavyvomuqal.eu
jecuzojitub.eu
qexukoqodar.eu
kezigojohuf.eu
rylodoqakal.eu
lykatojexub.eu
tujeqoqybar.eu
xugynajuquf.eu
pufucaqurak.eu
cidizakisuv.eu
disojawogaw.eu
vopogakakud.eu
fotasawezak.eu
noretekyvuv.eu
gaqyqewymow.eu
mamunekuryd.eu
jeniceripoj.eu
qebolelofyc.eu
kevajerajoq.eu
rycefelelys.eu
lyxesyrecoj.eu
tulyrylynyc.eu
xukuqyruwoq.eu
pujibylityp.eu
cihocytodoh.eu
digalyzohyx.eu
vofejutalom.eu
fodyfuzexyp.eu
nopuputyboh.eu
gaturuzuqyx.eu
marimutitom.eu
jewobuxisyt.eu
qeqaxupogog.eu
kemelixakyz.eu
rynyhipexon.eu
lyvufixyvet.eu
tucipipumig.eu
xuxorixurez.eu
puzomipipin.eu
cilavocofer.eu
dikexosajif.eu
vojykocezel.eu
foguhosecib.eu
nofidocyner.eu
gadoposuwif.eu
masawocipel.eu
jepemadodiv.eu
qetevavahew.eu
keryxadalid.eu
ryqukavecek.eu
lymigadybiv.eu
tunodavuqew.eu
xubateditid.eu
puvewevodek.eu
cicynefogic.eu
dixuvebakeq.eu
voluzefexus.eu
fokikebyvaj.eu
nojogefumuc.eu
gahadyburaq.eu
magetyfisus.eu
jefyqynofaj.eu
qedunygajux.eu
kepicynezam.eu
rytozygyvup.eu
lyrojunynah.eu
tuwaguguwux.eu
xuqesunipam.eu
pumytugofup.eu
cinuqumahag.eu
divinuheluz.eu
vococumecan.eu
foxalihynut.eu
nozejimuqag.eu
galefihituz.eu
makysimodan.eu
jejurijogut.eu
qegiqiqakof.eu
kefobojexyl.eu
rydacoqybob.eu
lyselojumyr.eu
tupyjoqirof.eu
xutufojisyl.eu
purupoqogob.eu
ciqirokajyr.eu
dimomawezod.eu
vonabakyvyk.eu
fobexawumov.eu
novylakuwyw.eu
gacuhawipod.eu
maxifakofyk.eu
jeloperajov.eu
qekorelelyq.eu
kejamerecos.eu
ryhevelynyj.eu
lygyxeruqoc.eu
tufukelityq.eu
xudiherodos.eu
pupodylahej.eu
citapytakic.eu
direwyzexem.eu
vowemytybip.eu
foqyvyzuqeh.eu
nomuxytirix.eu
ganikuzosem.eu
mavogutogip.eu
jecaduxakeh.eu
qexetupezix.eu
kezywuxyven.eu
rylunupumit.eu
lykuvuxureg.eu
tujizipipiz.eu
xugokixofen.eu
pufagipajit.eu
cidediceleg.eu
disytisycil.eu
vopuqicyneb.eu
fotinosuwir.eu
norococitef.eu
gaqozosodul.eu
mamajocahab.eu
jenegodelur.eu
qebysovexaf.eu
kevutodybuk.eu
ryciqavuqav.eu
lyxonadituw.eu
tulacavosad.eu
xukeladoguk.eu
pujejavakav.eu
cihyfafexuw.eu
digusebyvad.eu
vofirefumuj.eu
fodoqebirac.eu
nopabefipuq.eu
gatecebofas.eu
marylefajuj.eu
jewujenezac.eu
qequfygycuq.eu
kemipynunap.eu
rynoryguwuh.eu
lyvamynipox.eu
tucebygodym.eu
xuxyxynahop.eu
puzulugelyh.eu
cilihumecox.eu
dikofuhybym.eu
vojopumuqot.eu
fogaruhityg.eu
nofemumodoz.eu
gadyvuhagyn.eu
masuximakot.eu
jepikijexyg.eu
qetohiqyvoz.eu
keradijumyn.eu
ryqepiqiror.eu
lymewijosyf.eu
tunymoqofol.eu
xubuvojajyb.eu
puvixoqezor.eu
cicokokyvyf.eu
dixagowunol.eu
voledokuwev.eu
fokytowipiw.eu
nojuwakofed.eu
gahunawahik.eu
magivakelev.eu
jefozaryciw.eu
qedakalyned.eu
kepegaruqik.eu
rytydelitec.eu
lyruterodiq.eu
tuwiqelages.eu
xuqonerekij.eu
pumocelexec.eu
cinazetybiq.eu
divejezumes.eu
vocygytirij.eu
foxusyzosex.eu
nozitytogim.eu
galoqyzajep.eu
makanytezih.eu
jejecyxyvex.eu
qegelupumum.eu
kefyjuxiwap.eu
rydufupipug.eu
lysisuxofaz.eu
tuporupajun.eu
xutaquxelat.eu
purebupycug.eu
ciqycicunaz.eu
dimulisuqun.eu
vonujicitat.eu
fobifisoduf.eu
novopicahal.eu
gacarisekub.eu
maxemocexar.eu
jelybodybuf.eu
qekuxovuqal.eu
kejilodirub.eu
ryhohovosar.eu
lygofodagud.eu
tufapovakak.eu
xuderadezuv.eu
pupymavyvow.eu
cituvafumyd.eu
dirixabirok.eu
vowokafopyv.eu
foqahabofoq.eu
nomedefajys.eu
ganepebeloj.eu
mavywefycyc.eu
jecumenunoq.eu
qexiveguwys.eu
kezoxenitoj.eu
rylakegodyc.eu
lykegynahom.eu
tujydygelyp.eu
xugutynyxoh.eu
pufuwygybyx.eu
cidinymuqom.eu
disovyhityp.eu
vopazumosoh.eu
fotekuhagyx.eu
norygumekon.eu
gaquduhexet.eu
mamitumyvig.eu
jenoqujumez.eu
qebonuqirin.eu
kevacijopet.eu
ryceziqofig.eu
lyxyjijajel.eu
tulugiqezib.eu
xukisijycer.eu
pujotiqunif.eu
cihaqokiwel.eu
digenowipib.eu
vofecokoder.eu
fodylowahif.eu
nopujokelek.eu
gatifowyciv.eu
marosokubew.eu
jewararuqid.eu
qeqeqalitek.eu
kemybarodiv.eu
rynucalagew.eu
lyvularekud.eu
tucijalexaj.eu
xuxoferyvuc.eu
puzapelumaq.eu
cileretirus.eu
dikymezosaj.eu
vojubetafuc.eu
fogixezajaq.eu
nofoletezup.eu
gadohyzyvah.eu
masafytunux.eu
jepepyxiwam.eu
qetyrypopup.eu
kerumyxofah.eu
ryqivypahux.eu
lymoxuxelam.eu
tunakupycut.eu
xubehuxunag.eu
puvedupuquz.eu
cicypucitan.eu
dixuwusodut.eu
volimucagog.eu
fokovisekyz.eu
nojaxicyxon.eu
gahekisybyr.eu
magygicumof.eu
jefudidiryl.eu
qedutivosob.eu
kepiwodagyr.eu
rytonovejof.eu
lyravodezyl.eu
tuwezovyvov.eu
xuqykodumyw.eu
pumugoviwod.eu
cinidofopyk.eu
divotabofov.eu
vocoqafajyw.eu
foxanabelod.eu
nozecafycyk.eu
galyzabunoc.eu
makujafiqyq.eu
jejigenitos.eu
qegosegodej.eu
kefatenahic.eu
rydeqegekeq.eu
lysenenyxis.eu
tupycegubej.eu
xutulenuqix.eu
purijygirem.eu
ciqofymosip.eu
dimasyhageh.eu
vonerymekix.eu
fobyqyhezem.eu
novubymyvip.eu
gacucuhumeg.eu
maxilumiriz.eu
jelojujopen.eu
qekafuqafit.eu
kejepujajeg.eu
ryhyruqeliz.eu
lygumujycen.eu
tufibiqunit.eu
xudoxijiwef.eu
pupoliqotul.eu
citahikodab.eu
direfiwahur.eu
vowypikelaf.eu
foqurowyxul.eu
nomimokubab.eu
ganovowuqur.eu
mavaxokitad.eu
jecekorosuk.eu
qexeholagav.eu
kezydorekuw.eu
rylupalyxad.eu
lykiwaryvuk.eu
tujomalumav.eu
xugavariruq.eu
pufexalopas.eu
cidykatafuj.eu
disugezejac.eu
vopudetezuq.eu
fotitezycas.eu
norowetunuj.eu
gaqaneziwoc.eu
mamevetopym.eu
jenyzexodop.eu
qebukypahyh.eu
kevigyxelox.eu
rycodypycym.eu
lyxotyxubop.eu
tulaqypiqyh.eu
xukenyxitox.eu
pujycupodyn.eu
cihuzucagot.eu
digijusekyg.eu
vofogucyxoz.eu
fodasusuvyn.eu
nopetucumot.eu
gatequsiryg.eu
marynicosol.eu
jewucidafyb.eu
qeqilivejor.eu
kemojidezyf.eu
rynafivyvol.eu
lyvesiduneb.eu
tucyroviwir.eu
xuxuqodopef.eu
puzubovafik.eu
cilicofahev.eu
dikolobeliw.eu
vojajofyced.eu
fogefobunik.eu
nofypafiqev.eu
gadurabotiw.eu
masimafoded.eu
jepobanagij.eu
qetoxagekec.eu
keralanyxiq.eu
ryqehegubes.eu
lymyfenumij.eu
tunupegirec.eu
xubirenosiq.eu
puvomegagep.eu
cicavemejih.eu
dixexehyzex.eu
volekymyvum.eu
fokyhyhumap.eu
nojudymiwuh.eu
gahipyhopax.eu
magowymafum.eu
jefamyjejat.eu
qedevuqelug.eu
kepyxujycaz.eu
rytukuqunun.eu
lyrugujiqat.eu
tuwiduqotug.eu
xuqotujodaz.eu
pumawuqahun.eu
cinenikekar.eu
divyviwyxuf.eu
vocuzikubal.eu
foxikiwiqub.eu
nozogikirar.eu
galodiwosuf.eu
makatokagal.eu
jejeqorekuv.eu
qegynolyzow.eu
kefucoruvyd.eu
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\JAFFAC~1.EXE," JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe -
Simda family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\ = "Microsoft Edge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\StubPath = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.69\\Installer\\setup.exe\" --configure-user-settings --verbose-logging --system-level --msedge --channel=stable" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Localized Name = "Microsoft Edge" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\IsInstalled = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Version = "43,0,0,0" setup.exe -
Downloads MZ/PE file 2 IoCs
flow pid Process 391 816 Process not Found 419 3596 Process not Found -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 10 IoCs
pid Process 4244 setup.exe 1428 setup.exe 3672 setup.exe 1424 setup.exe 4204 setup.exe 1872 setup.exe 2420 setup.exe 1808 setup.exe 4172 setup.exe 2140 setup.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1639772215-809007892-4072230623-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JAFFAC~1.EXE" JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\c51fbdba = "ø6)\tG®Œ\a\x02í9ÁE¥ê\x05ûÜA\x7f\u0090ªèr¼í|ò·‡ƒé‹º3Ýà\u00adŸ\x17²§~ï\x15B‹S¢½z\x12Ña\x13>µb‡/Ã\vlÃ6ùG\u00ad\x13tÓæjcg’E'&<Ó\x01”0a5ä>[1ÛŒîã\x1b¼ü–\x04u1tÆÔáÛ-m&v\x13«4ÜY}ö\u0081\x05Æ\x13t…\x0e|íþ¼¹;Ñqœôl\vìþÞ³EtC;Û<M3Õ\\“<\fœô›ì\x14¶uc5Öë†%öë£\x03\\l\u008d†Ì\\.Ô^q4\x05û\x1e;;n«–\x03,Sþœ;t<$™Ë\x13–Ãs{)<îÞ¼¤Þ™.);3|E£-öìFÜÆ|\x11l\x0eÉ6Iæ\x13cuáé~\x03lö‹¤¾T[ƒí©ÓñV†\x14k+ìö" JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JAFFAC~1.EXE" JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Microsoft Edge.lnk setup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Trust Protection Lists\Mu\Social setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Locales\tt.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\133.0.3065.69.manifest setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\tr.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Trust Protection Lists\Mu\Cryptomining setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\libEGL.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\fr.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\identity_proxy\win10\identity_helper.Sparse.Dev.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\ca-Es-VALENCIA.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\or.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\PdfPreview\PdfPreviewHandler.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Trust Protection Lists\Mu\Analytics setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\d3dcompiler_47.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Trust Protection Lists\Sigma\Other setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\mk.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Locales\sk.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\dual_engine_adapter_x64.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\he.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\mt.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\sl.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\vi.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\msedge.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\mspdf.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\vk_swiftshader_icd.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\EBWebView\x64\EmbeddedBrowserWebView.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Trust Protection Lists\Mu\Other setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\nn.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Locales\hu.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Locales\kk.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\tt.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\ga.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Trust Protection Lists\Sigma\Analytics setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Trust Protection Lists\Sigma\Entities setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Locales\cs.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\133.0.3065.69.manifest setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\lt.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\dual_engine_adapter_x64.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\sr-Latn-RS.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\identity_proxy\internal.identity_helper.exe.manifest setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Locales\kok.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\gl.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\sv.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\oneauth.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\zh-TW.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Locales\gl.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Locales\ka.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\edge_feedback\mf_trace.wprp setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\identity_proxy\win11\identity_helper.Sparse.Stable.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\sl.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\VisualElements\LogoBeta.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Locales\bn-IN.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\vcruntime140_1.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\ca-Es-VALENCIA.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\BHO\ie_to_edge_stub.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Locales\kn.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Locales\sr-Latn-RS.pak setup.exe File opened for modification C:\Program Files\msedge_installer.log setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Trust Protection Lists\Mu\Social setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\EdgeWebView.dat setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\gl.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\ta.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\eventlog_provider.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\identity_proxy\canary.identity_helper.exe.manifest setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\identity_proxy\dev.identity_helper.exe.manifest setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4504 MicrosoftEdgeUpdate.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.69\\BHO" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.69\\BHO" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\EnterpriseMode\MSEdgePath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations\C:\Program Files (x86)\Microsoft\Edge\Application = "1" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main\EnterpriseMode setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights setup.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Edge setup.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Edge\InstallerPinned = "0" setup.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\image/svg+xml\Extension = ".svg" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.pdf\OpenWithProgids setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mhtml\OpenWithProgIds\MSEdgeMHT setup.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeHTM\shell\open setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\DefaultIcon\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.69\\msedge.exe,11" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\Application\AppUserModelId = "MSEdge" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeMHT\Application setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{4A749F25-A9E2-4CBE-9859-CF7B15255E14} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\image/svg+xml setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\microsoft-edge\shell setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeMHT\shell\runas\ProgrammaticAccessOnly setup.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\EnablePreviewHandler = "1" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeHTM\shell setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.svg\OpenWithProgIds\MSEdgeHTM setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\DefaultIcon\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.69\\msedge.exe,0" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.mht setup.exe Key created \REGISTRY\MACHINE\Software\Classes\AppID\{1FCBE96C-1697-43AF-9140-2897C7C69767} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Implemented Categories setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Implemented Categories setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\shell\runas\ProgrammaticAccessOnly setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.shtml\OpenWithProgids setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\shell\open\command\ = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --single-argument %1" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeMHT setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeMHT\Application\ApplicationDescription = "Browse the web" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5}\LocalServer32 setup.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5}\LocalServer32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{31575964-95F7-414B-85E4-0E9A93699E13}\ = "ie_to_edge_bho" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\TypeLib\ setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.xht\OpenWithProgids setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.xml\OpenWithProgids setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\microsoft-edge setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeHTM\shell\runas\command setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.svg setup.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{C9C2B807-7731-4F34-81B7-44FF7779522B} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\TypeLib\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\VersionIndependentProgID\ = "ie_to_edge_bho.IEToEdgeBHO" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\CLASSES\MIME\Database setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\microsoft-edge setup.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}\ProxyStubClsid32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.69\\BHO\\ie_to_edge_bho_64.dll" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\microsoft-edge\ = "URL:microsoft-edge" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface setup.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{C9C2B807-7731-4F34-81B7-44FF7779522B}\1.0\0 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\DisplayName = "PDF Preview Handler" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\CLASSES\MIME setup.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5}\LocalServer32\ = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.69\\notification_helper.exe\"" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\Application\ApplicationIcon = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.69\\msedge.exe,0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\InprocServer32\ThreadingModel = "Apartment" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ProgID\ setup.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{B54934CD-71A6-4698-BDC2-AFEA5B86504C} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\microsoft-edge\shell\open setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgePDF\shell setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.webp setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\Application\ApplicationName = "Microsoft Edge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\Application\ApplicationCompany = "Microsoft Corporation" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID setup.exe Key created \REGISTRY\MACHINE\Software\Classes\AppID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO setup.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeSecurityPrivilege 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe Token: SeSecurityPrivilege 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe Token: SeSecurityPrivilege 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe Token: SeSecurityPrivilege 3112 JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe Token: 33 4244 setup.exe Token: SeIncBasePriorityPrivilege 4244 setup.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2196 wrote to memory of 4244 2196 MicrosoftEdge_X64_133.0.3065.69.exe 107 PID 2196 wrote to memory of 4244 2196 MicrosoftEdge_X64_133.0.3065.69.exe 107 PID 4244 wrote to memory of 1428 4244 setup.exe 108 PID 4244 wrote to memory of 1428 4244 setup.exe 108 PID 4244 wrote to memory of 3672 4244 setup.exe 109 PID 4244 wrote to memory of 3672 4244 setup.exe 109 PID 3672 wrote to memory of 1424 3672 setup.exe 110 PID 3672 wrote to memory of 1424 3672 setup.exe 110 PID 4244 wrote to memory of 4204 4244 setup.exe 111 PID 4244 wrote to memory of 4204 4244 setup.exe 111 PID 4244 wrote to memory of 1872 4244 setup.exe 112 PID 4244 wrote to memory of 1872 4244 setup.exe 112 PID 4244 wrote to memory of 2420 4244 setup.exe 113 PID 4244 wrote to memory of 2420 4244 setup.exe 113 PID 4204 wrote to memory of 1808 4204 setup.exe 114 PID 4204 wrote to memory of 1808 4204 setup.exe 114 PID 2420 wrote to memory of 4172 2420 setup.exe 116 PID 2420 wrote to memory of 4172 2420 setup.exe 116 PID 1872 wrote to memory of 2140 1872 setup.exe 115 PID 1872 wrote to memory of 2140 1872 setup.exe 115 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} = "1" setup.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_fc642b52f11f7857eb4620e8f03add8b.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3112
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI4IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY4ODkiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxOTM2NTgwOTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MzYyMTI2OTM3Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4504
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0DEC8FD-4919-407B-9396-606D957CB519}\MicrosoftEdge_X64_133.0.3065.69.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0DEC8FD-4919-407B-9396-606D957CB519}\MicrosoftEdge_X64_133.0.3065.69.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable1⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0DEC8FD-4919-407B-9396-606D957CB519}\EDGEMITMP_E3D95.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0DEC8FD-4919-407B-9396-606D957CB519}\EDGEMITMP_E3D95.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0DEC8FD-4919-407B-9396-606D957CB519}\MicrosoftEdge_X64_133.0.3065.69.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4244 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0DEC8FD-4919-407B-9396-606D957CB519}\EDGEMITMP_E3D95.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0DEC8FD-4919-407B-9396-606D957CB519}\EDGEMITMP_E3D95.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0DEC8FD-4919-407B-9396-606D957CB519}\EDGEMITMP_E3D95.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff72ca96a68,0x7ff72ca96a74,0x7ff72ca96a803⤵
- Executes dropped EXE
PID:1428
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0DEC8FD-4919-407B-9396-606D957CB519}\EDGEMITMP_E3D95.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0DEC8FD-4919-407B-9396-606D957CB519}\EDGEMITMP_E3D95.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0DEC8FD-4919-407B-9396-606D957CB519}\EDGEMITMP_E3D95.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0DEC8FD-4919-407B-9396-606D957CB519}\EDGEMITMP_E3D95.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0DEC8FD-4919-407B-9396-606D957CB519}\EDGEMITMP_E3D95.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff72ca96a68,0x7ff72ca96a74,0x7ff72ca96a804⤵
- Executes dropped EXE
PID:1424
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --msedge --channel=stable --register-package-identity --verbose-logging --system-level3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff6e2856a68,0x7ff6e2856a74,0x7ff6e2856a804⤵
- Executes dropped EXE
PID:1808
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff6e2856a68,0x7ff6e2856a74,0x7ff6e2856a804⤵
- Executes dropped EXE
PID:2140
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --msedge --channel=stable --update-game-assist-package --verbose-logging --system-level3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x224,0x228,0x22c,0x100,0x230,0x7ff6e2856a68,0x7ff6e2856a74,0x7ff6e2856a804⤵
- Executes dropped EXE
PID:4172
-
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k AppReadiness -p -s AppReadiness1⤵PID:1788
-
C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe"C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe" /InvokerPRAID: Microsoft.MicrosoftOfficeHub prelaunch1⤵PID:2296
-
C:\Windows\system32\wwahost.exe"C:\Windows\system32\wwahost.exe" -ServerName:Microsoft.MicrosoftOfficeHub.wwa1⤵PID:5232
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Component Object Model Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0DEC8FD-4919-407B-9396-606D957CB519}\EDGEMITMP_E3D95.tmp\setup.exe
Filesize6.8MB
MD5bdb1aecedc15fc82a63083452dad45c2
SHA1a074fcd78665ff90ee3e50ffcccad5f6c3e7ddcb
SHA2564ea0907c3fc2c2f6a4259002312671c82e008846d49957bb3b9915612e35b99f
SHA51250909640c2957fc35dd5bcac3b51797aa5daa2fb95364e69df95d3577482e13f0c36a70ae098959cb9c2aaeb4cfe43025c1d8d55b5f8858b474bcb702609749d
-
Filesize
3.9MB
MD54aaa893417cccc147989f876c6a7b295
SHA1b1e35c83518bb275924ead0cd6206bf0c982d30f
SHA2562c38e3c3f18e2d3fb7f04336356b9b5186cabe06b3343beec318ef0def1a9eeb
SHA512109e0c88977fae65a4950fc38393ca32a70d68ef41aeb75b28e6566e0fa626e32e31be38308e7ed5b6a8ba1f56fb5f2133a07aa8bb643224c3dbb089ce9cfd0e
-
Filesize
74KB
MD584da278c1becb42ca734defa01fa66e2
SHA1716f0c518759957c80b4d833e3cd7f63cdaa54d3
SHA256e6d902309dd02b0ec2d90183d178c4608fa0daca747414d3976d3d9436ee6102
SHA512e4604af25425867c8b7d55bdc3ac00091b22134b9d76a74c4ea74533c6ab068890d9fcd92e659f20bb179a6eaf4813b88976febe2e51380843f89a671d58cd86
-
Filesize
98KB
MD51271be9ab1f020960093fe3e0ba68852
SHA1c03471f0da2cc1b895664b6f9941ff76e1d73d2d
SHA256ddf3ec5e05c57bd2a8e37b2ecad286265e1fcbf45593176594e2629bc6194fb6
SHA51259806b0a3903f1c7365435d8999dc1c38da861c8a12d811c7b860557aff4f902dc17c19a5389a3ec569114d9e62986e518a73e548eaf99e0cd52166afd18d892
-
Filesize
103KB
MD51d4e30d5eb0e0ed6f810010547185803
SHA1b15139e138f12813a47fda934bea4413e3a6830a
SHA2566a046f7d6baa7188ccda2fe425052bafcfa85487f606d91bd44a205d728b87b7
SHA512eee339427f70de6e47968e253ef5ee5e7eefdd1e45837e909962b83c628721d22828650105b501e19381e6b4e6074a9c782a7f4e736db20cc9067438cd855d41
-
Filesize
103KB
MD5ae19f7ec53316852b9b24844049c8da9
SHA184afd6d880b9018de91d9c6862fd95831ae8dfdb
SHA25645f30fcfce3370cfc3278d5bb17229aa2b12a6c7145ee1d38ce3197015501e9c
SHA512547953a33e4605e395ecc9f6519792005eae0941aa60b726ec2766a7769ed4c75e330de8109138660c4dacf1a3b56ae30f8f9a90488197ea56e0fbefb2bf7e8d