Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 10:49
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8a9a050661003dcd550f27b846b60dc9.html
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8a9a050661003dcd550f27b846b60dc9.html
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_8a9a050661003dcd550f27b846b60dc9.html
-
Size
22KB
-
MD5
8a9a050661003dcd550f27b846b60dc9
-
SHA1
a85217c6252a92eae71052a6d9b6e49fc919d9cf
-
SHA256
cbcd82e0f7462d2beb218cc8c33a995105afdc4c42294371709128ac338c2d71
-
SHA512
438b742021c58e7e933c248f0924a07bd3aa1837f729d45aef85f51c3b987369d4b88ca07ccdff8df216ba8c6bbea031e706b98bfe57ab7a17f9e9df32ee661d
-
SSDEEP
384:GjdB7ttYgwWmz2i5x5MjW86FtiD/C/afQaa9vu59l4io:EdbtYgXmz2i5OSiD+faa9vI9lW
Malware Config
Signatures
-
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping1800_2094579828\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1800_2094579828\nav_config.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1800_2094579828\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1800_799557317\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1800_799557317\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1800_2135349947\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1800_2135349947\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1800_2135349947\manifest.fingerprint msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133876325838313829" msedge.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-869607583-2483572573-2297019986-1000\{0835A123-51AD-4E0A-B5AA-B687D06ECDB3} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1560 msedge.exe 1560 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1800 wrote to memory of 4756 1800 msedge.exe 86 PID 1800 wrote to memory of 4756 1800 msedge.exe 86 PID 1800 wrote to memory of 1184 1800 msedge.exe 87 PID 1800 wrote to memory of 1184 1800 msedge.exe 87 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 712 1800 msedge.exe 88 PID 1800 wrote to memory of 636 1800 msedge.exe 89 PID 1800 wrote to memory of 636 1800 msedge.exe 89 PID 1800 wrote to memory of 636 1800 msedge.exe 89 PID 1800 wrote to memory of 636 1800 msedge.exe 89 PID 1800 wrote to memory of 636 1800 msedge.exe 89 PID 1800 wrote to memory of 636 1800 msedge.exe 89 PID 1800 wrote to memory of 636 1800 msedge.exe 89 PID 1800 wrote to memory of 636 1800 msedge.exe 89 PID 1800 wrote to memory of 636 1800 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8a9a050661003dcd550f27b846b60dc9.html1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x24c,0x7ff8b8f8f208,0x7ff8b8f8f214,0x7ff8b8f8f2202⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1964,i,18243956026302990701,9036111753111862488,262144 --variations-seed-version --mojo-platform-channel-handle=2316 /prefetch:32⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2280,i,18243956026302990701,9036111753111862488,262144 --variations-seed-version --mojo-platform-channel-handle=2276 /prefetch:22⤵PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2576,i,18243956026302990701,9036111753111862488,262144 --variations-seed-version --mojo-platform-channel-handle=2572 /prefetch:82⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3496,i,18243956026302990701,9036111753111862488,262144 --variations-seed-version --mojo-platform-channel-handle=3512 /prefetch:12⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3544,i,18243956026302990701,9036111753111862488,262144 --variations-seed-version --mojo-platform-channel-handle=3672 /prefetch:12⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4148,i,18243956026302990701,9036111753111862488,262144 --variations-seed-version --mojo-platform-channel-handle=4288 /prefetch:12⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4196,i,18243956026302990701,9036111753111862488,262144 --variations-seed-version --mojo-platform-channel-handle=4408 /prefetch:22⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --always-read-main-dll --field-trial-handle=3808,i,18243956026302990701,9036111753111862488,262144 --variations-seed-version --mojo-platform-channel-handle=3836 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5344,i,18243956026302990701,9036111753111862488,262144 --variations-seed-version --mojo-platform-channel-handle=5348 /prefetch:82⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5352,i,18243956026302990701,9036111753111862488,262144 --variations-seed-version --mojo-platform-channel-handle=5484 /prefetch:82⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5364,i,18243956026302990701,9036111753111862488,262144 --variations-seed-version --mojo-platform-channel-handle=5372 /prefetch:82⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5368,i,18243956026302990701,9036111753111862488,262144 --variations-seed-version --mojo-platform-channel-handle=5452 /prefetch:82⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6088,i,18243956026302990701,9036111753111862488,262144 --variations-seed-version --mojo-platform-channel-handle=6116 /prefetch:82⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6088,i,18243956026302990701,9036111753111862488,262144 --variations-seed-version --mojo-platform-channel-handle=6116 /prefetch:82⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6240,i,18243956026302990701,9036111753111862488,262144 --variations-seed-version --mojo-platform-channel-handle=6244 /prefetch:82⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6384,i,18243956026302990701,9036111753111862488,262144 --variations-seed-version --mojo-platform-channel-handle=6236 /prefetch:82⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6516,i,18243956026302990701,9036111753111862488,262144 --variations-seed-version --mojo-platform-channel-handle=6520 /prefetch:82⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6336,i,18243956026302990701,9036111753111862488,262144 --variations-seed-version --mojo-platform-channel-handle=6232 /prefetch:82⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6320,i,18243956026302990701,9036111753111862488,262144 --variations-seed-version --mojo-platform-channel-handle=6672 /prefetch:82⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6836,i,18243956026302990701,9036111753111862488,262144 --variations-seed-version --mojo-platform-channel-handle=6832 /prefetch:82⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6984,i,18243956026302990701,9036111753111862488,262144 --variations-seed-version --mojo-platform-channel-handle=6992 /prefetch:82⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7144,i,18243956026302990701,9036111753111862488,262144 --variations-seed-version --mojo-platform-channel-handle=6248 /prefetch:82⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6180,i,18243956026302990701,9036111753111862488,262144 --variations-seed-version --mojo-platform-channel-handle=7248 /prefetch:82⤵PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4304,i,18243956026302990701,9036111753111862488,262144 --variations-seed-version --mojo-platform-channel-handle=6920 /prefetch:82⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4444,i,18243956026302990701,9036111753111862488,262144 --variations-seed-version --mojo-platform-channel-handle=4696 /prefetch:82⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5680,i,18243956026302990701,9036111753111862488,262144 --variations-seed-version --mojo-platform-channel-handle=6972 /prefetch:82⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5684,i,18243956026302990701,9036111753111862488,262144 --variations-seed-version --mojo-platform-channel-handle=5656 /prefetch:82⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6716,i,18243956026302990701,9036111753111862488,262144 --variations-seed-version --mojo-platform-channel-handle=6760 /prefetch:82⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6288,i,18243956026302990701,9036111753111862488,262144 --variations-seed-version --mojo-platform-channel-handle=6432 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6284,i,18243956026302990701,9036111753111862488,262144 --variations-seed-version --mojo-platform-channel-handle=6440 /prefetch:82⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:1220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160B
MD5c3911ceb35539db42e5654bdd60ac956
SHA171be0751e5fc583b119730dbceb2c723f2389f6c
SHA25631952875f8bb2e71f49231c95349945ffc0c1dd975f06309a0d138f002cfd23d
SHA512d8b2c7c5b7105a6f0c4bc9c79c05b1202bc8deb90e60a037fec59429c04fc688a745ee1a0d06a8311466b4d14e2921dfb4476104432178c01df1e99deb48b331
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
43B
MD5af3a9104ca46f35bb5f6123d89c25966
SHA11ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8
SHA25681bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea
SHA5126a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD54facd0ff10154cde70c99baa7df81001
SHA165267ea75bcb63edd2905e288d7b96b543708205
SHA256a13534df0cd0a79a3a1b91085a6d575b47d5a9aad7fc6d712fd2616c0e95a23b
SHA512ad8d2b965851c0ddc23e92ae151b3b0b2bcda850c446f4278bdb0754d6b42ead8fc034b394749578a27b33ad7e4ab0633f974dfd4773fbe4d93ae477f00b73f2
-
Filesize
280B
MD5049e5a246ed025dee243db0ba8e2984c
SHA115ec2d2b28dcfc17c1cfb5d0c13482d0706f942d
SHA25633071ca42c472861a2fabd0f82f8b03ef0daaa6796b24b83f3df02587e4c3d12
SHA512bc5f6fa6a8cae20ab40eae4552650d75f38ebb158c95288a79d9f332623bb507946513c39d19c00a5aee323df01f0f1a51c54594ef1c293289baf45f4ae2145b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5b2389ad8a471a4b0f33eddec2a4330bb
SHA1b0e8dd70d5e9c36300ce30449665dc19dc14a4ea
SHA256b2ac0da7959d9ea990d99f5f3c0242b19cddd48ea4c5be9a08f86d6effb002a3
SHA512241030602544ef53cb777dd73c004f4639cb19634421a62ff3193ebbebd47a7dbc91a636917f966c0d30d77798b2a3bfe82089066eb473a6e48b194fb9e618b2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57ee57.TMP
Filesize3KB
MD522fac65716cddc025108863fa0b4f203
SHA1f1dd4d7316fd2556ce1659ac29be995d7a7f9545
SHA256e56ea49fee08ad8a5ef440c1d4caf9060444b22ab67f771a76dcb6bb86e55c2f
SHA5124c4cc96dec59f953a0dcb23b4fa6fd2c2c9a314b4e6dc9d3247733123b63fde4ff121fae07b5c60de0288cb80074cd418136d89134465629e42d147433ad5a03
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD546bb8744696037b525061e64ddb06faa
SHA1176abf97eaf20f87d93689f388cb2461ef5992e7
SHA256d3cb12c96562d6acc2f02e4925929fdb52451cba2bd680d58737e4da564c9d01
SHA5126f6eb8e1e7b75360b355f1d999e55f5901dabfbbd9f8c65135d37ff45fedcd196a8bf6c1c09c7df1333dbbab18ce1360fe2b435abead0f5685bc0a3fcf9b1b39
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
14KB
MD556264d276ca9d8bbf5271b3c31e5972e
SHA1cb2a0e0c743bef54881ff152c4a8063538428337
SHA2567880ac35756c7c39673407b9b94a443b8bd2391773836f85e8716f594bce6bf9
SHA512fedb25ebdee6aff83e8019a202e85e5b7f48445642dada463a0360b85f127da89d86651dd0a6d57f6a4a49554257bf524ff34dfa39baca1c9749e71c74406278
-
Filesize
14KB
MD593692f94087f4a43265e4d9be511c2c2
SHA1c35793cf639bbd15ea4b34d36d668771602a66f8
SHA2569d0b6813dde9e530c711f8fa3533437ea5bf3541c9b310d466e44dc87eb3bdf9
SHA512db65c1416e8187780c521fe1ca48fac9a551facffc99742106a30309a1de5168b4259c3259125414d045a9c3dc3d8a432e73a9b414e00302e8f1871e3c710c56
-
Filesize
36KB
MD5eb87d9ccf8da46f308baae2b73bdb966
SHA1c9f013bb2b1c3fa0103a24c2d081aca703f0c77f
SHA256e7bea250d42319696e6b7d7da7182bb1600114f12542365c3beea4c8527b6d95
SHA512a81856145b531cb30ac10482c0c1d9e1681a98c7400446a24c3540c37c2084d84c57620e3b80c2ec91f5c266cbde4b7abd71045ee2e165d15c92c3036c3c8e94
-
Filesize
4KB
MD5f070c6d61c0e9fc48da3279fa3f5aa6d
SHA1fea46a2012ef26238378bf5ced61e7d2b81ea787
SHA256bd04a1b2e087afff6d089e245dac2b852bf1af3afa0b33afb758e5f0f93a10b3
SHA512ef5c26759bec6b103eb609cf8869ed7bffac37c08219485771a60486b0f336b96ba0a21e03498dafa0de03cec140cdd312fb63fe605543d079c2cdb8efc462ca
-
Filesize
1KB
MD59fa7d72ea610031d729e6dc2ce63293d
SHA1ae72075c08d15c79bd1b4886fd60dcd7550885d8
SHA256e3fed082cbed1544b7cff95f5d0984c44c52d73703721d36f673d0bba33bd1ef
SHA5128d52612dfadbb095664cf77d53ace67a038b39a69690f03889a0d770bdb0cea33481daab98bc759c0ec4b44652228581ea371c430c0c179e422717526f08afbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\5d6cf04c-9db4-4142-8735-203a2336c958.tmp
Filesize22KB
MD556a63f182b2938fbe3e59fbf9681dc08
SHA1b76578ca24fb20b8bd5dafad4296e5a46735a5e1
SHA25636edc2510fb072092e4c6b95efe4521857d9dcb7f0b45afdf5e8ef02e5d19593
SHA512b17246b7c61e26fce1f211311b578d6b3d22c03a042137bb2bb5b23018ce5290a8fbf7a34b2f66fa30b2027296b8a570478f66a144385c320d63c1cef64434f8
-
Filesize
23KB
MD57cb66a620ef60307e2e08b0fa89d1f8c
SHA10a6b99a5b9f6627e1d7c12c6b528ee25052ba2c6
SHA25667fbd55ce9c381592c8e72dc22220ded189f0382934cd032571863a817d1c8b3
SHA512ced1a381607fcaa1d8285f74af8fcb515c17748e6edc52ac84d4dbd6ae258776afde80803fa596ed7ce2ba39617f00c855c34bf649f3667b17b2f9b934f0b1fd
-
Filesize
880B
MD5873d6dd73a1e40abef40dd07e7452f55
SHA1bd3e8b7eb35b751c72aa69fe09b963ed055859eb
SHA25630cd57c0ff963e58efbc0a9486c891e4be3fe55ae5fd70bf0a63543f51f73529
SHA512c8c46c26ff24e91d9beda57f1d7ab247a87f20fcb5d3780300b0ce2202da21f20097926406adc06f326eced428919aff44acdd3eda53f7305ac5202f7887e193
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog~RFe588a0b.TMP
Filesize469B
MD5ce85cf4cee6bb250a481140f318b7f1d
SHA164c09b626aef3ecee30f695bf069a7101a2749e1
SHA2564039d4ebca2a233a3b1050a0c0cc598671e062ca420d733037144d10737787cd
SHA5126dbc7f3c0774ade859904badef08654eed7e0bfe90990adf8fe464d931938c317adb775b9b384011e0eb3a0a28020f8315ae7ee074a4332ba64da983669312a2
-
Filesize
30KB
MD5d38ae378ff89dc8c43dbd8bd3b76bc78
SHA18db39b26669c780f625518446af0f72f9fbf9a2a
SHA256acce1448a402f9779655e6242f59266b738da32d0e8096a822bff63d4216957e
SHA512a3e35666ba45e1f95c9ed8e3d4422ff6f2ea76b845dbbf8c9b43ee68c2e55fd8c6e68725389d226d18572c4bc374ed62e8d041a55ade89714c4963ea478b55cf
-
Filesize
34KB
MD5d2afc792c60934236c00c38d4b662675
SHA1d1e956ff41a618c34aa89d3976adfbd0fbc25008
SHA256fd6ea6415d48a84af3ca863cefd473fadf2cb05e1d2dd9a01005a49c7cd796e8
SHA5126baa74883ed9a9e8c0ab452839614bca685691c4747f9758b647c2b2ef06df22e8be5d2137d7f7a0a67f5df789f4a51d29c28898944d16da621b2461ab108aa6
-
Filesize
6KB
MD58f8fd0e6a0ad64f5c57aca7198d97820
SHA178e7d17bee4641ef64577f20330d5e445e24e7b6
SHA256eb54c64bf8ff9abfa3e91b6c0b56c0a5bafed0444c2e3b7535ac2a5a11517060
SHA5122a400837827b33965ad720ef79360ed3000c308fe74e33010926325af661da234e2c72fa695dfc4f7110f2853ca108d81041cb5c854e7715acc1a6a8a0c5aaa1
-
Filesize
7KB
MD5d55e942e9d44d83769452a1f8462a9b0
SHA109508785ed62849cb9b88b057cabdd943ec2f501
SHA2561e14c55f57e1f7bede1b521636ef1061112fe1af5d0d15b7fb0cc4114e2d268b
SHA5127b9e745b561e0e4037802dbe048879535bdded6ecae615e995d8458f38d6f6e965413fabc12943da7a709e4677ef27c74b2eac9f880a3f90401bc8de1acc1e7e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\WorkspacesNavigationComponent\1.0.0.5\nav_config.json
Filesize2KB
MD5499d9e568b96e759959dc69635470211
SHA12462a315342e0c09fd6c5fbd7f1e7ff6914c17e6
SHA25698252dc9f9e81167e893f2c32f08ee60e9a6c43fadb454400ed3bff3a68fbf0d
SHA5123a5922697b5356fd29ccf8dcc2e5e0e8c1fd955046a5bacf11b8ac5b7c147625d31ade6ff17be86e79c2c613104b2d2aebb11557399084d422e304f287d8b905
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5e47f5ab42529738aef1f30de4e66d20a
SHA1bc7506210452cad81b4edb2ea80497c1dcbcf078
SHA256843538b99fcfcc1a4e84c27e04a5a625e1ee56581de6b024468fafb9233a296f
SHA512ae3ce67e5c0fb170f1d8019e13bb4ac327d3be636bebbe444994e4459567bbed6ce679056d56cf0326817900631d63780efe1b2784db1fff3df679180ef6bcb4
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de