Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2025, 20:19
Behavioral task
behavioral1
Sample
JaffaCakes118_97a488a2443b91ff4c1c6d52a6bac5dc.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_97a488a2443b91ff4c1c6d52a6bac5dc.html
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_97a488a2443b91ff4c1c6d52a6bac5dc.html
-
Size
81KB
-
MD5
97a488a2443b91ff4c1c6d52a6bac5dc
-
SHA1
5ea4e0c7ed07d3f516cabf8f04fd95804ba42c1a
-
SHA256
db752754ebe792da48e4bf9ede07d0daf57e4867d6cac460729276ba6aa2d937
-
SHA512
61dc63001ee83eec5d08e41607a6f63b5413b5a78e22ad474cb4e42cc20b7c60a3cf6f5a61947db40084ae9d3bde2a64713cfee548feab0c206946d9f9e59a14
-
SSDEEP
768:S/bl+bvIZjG6FnYM1YsgyGTbn4d8vRvweIrFQ/4igGwxV+3bAg784h1:S/p+0UI/j68rGbmu1
Malware Config
Signatures
-
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping3148_1025758425\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3148_1025758425\nav_config.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3148_1025758425\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3148_190039460\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3148_190039460\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3148_106097848\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3148_106097848\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3148_106097848\manifest.fingerprint msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133877921195453766" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-869607583-2483572573-2297019986-1000\{BD40CDDE-F66F-4E5F-A481-489E16D4715F} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2072 msedge.exe 2072 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3148 wrote to memory of 4572 3148 msedge.exe 86 PID 3148 wrote to memory of 4572 3148 msedge.exe 86 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 3732 3148 msedge.exe 88 PID 3148 wrote to memory of 3732 3148 msedge.exe 88 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 1976 3148 msedge.exe 87 PID 3148 wrote to memory of 3408 3148 msedge.exe 89 PID 3148 wrote to memory of 3408 3148 msedge.exe 89 PID 3148 wrote to memory of 3408 3148 msedge.exe 89 PID 3148 wrote to memory of 3408 3148 msedge.exe 89 PID 3148 wrote to memory of 3408 3148 msedge.exe 89 PID 3148 wrote to memory of 3408 3148 msedge.exe 89 PID 3148 wrote to memory of 3408 3148 msedge.exe 89 PID 3148 wrote to memory of 3408 3148 msedge.exe 89 PID 3148 wrote to memory of 3408 3148 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_97a488a2443b91ff4c1c6d52a6bac5dc.html1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x260,0x7ffff15bf208,0x7ffff15bf214,0x7ffff15bf2202⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2232,i,5653370555654131728,11767898436129397404,262144 --variations-seed-version --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1896,i,5653370555654131728,11767898436129397404,262144 --variations-seed-version --mojo-platform-channel-handle=2268 /prefetch:32⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2564,i,5653370555654131728,11767898436129397404,262144 --variations-seed-version --mojo-platform-channel-handle=2572 /prefetch:82⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3488,i,5653370555654131728,11767898436129397404,262144 --variations-seed-version --mojo-platform-channel-handle=3516 /prefetch:12⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3472,i,5653370555654131728,11767898436129397404,262144 --variations-seed-version --mojo-platform-channel-handle=3500 /prefetch:12⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4240,i,5653370555654131728,11767898436129397404,262144 --variations-seed-version --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4304,i,5653370555654131728,11767898436129397404,262144 --variations-seed-version --mojo-platform-channel-handle=4384 /prefetch:22⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5180,i,5653370555654131728,11767898436129397404,262144 --variations-seed-version --mojo-platform-channel-handle=3716 /prefetch:82⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5364,i,5653370555654131728,11767898436129397404,262144 --variations-seed-version --mojo-platform-channel-handle=5344 /prefetch:82⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --always-read-main-dll --field-trial-handle=5384,i,5653370555654131728,11767898436129397404,262144 --variations-seed-version --mojo-platform-channel-handle=3752 /prefetch:12⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3772,i,5653370555654131728,11767898436129397404,262144 --variations-seed-version --mojo-platform-channel-handle=5476 /prefetch:82⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5140,i,5653370555654131728,11767898436129397404,262144 --variations-seed-version --mojo-platform-channel-handle=5568 /prefetch:82⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6116,i,5653370555654131728,11767898436129397404,262144 --variations-seed-version --mojo-platform-channel-handle=5792 /prefetch:82⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6116,i,5653370555654131728,11767898436129397404,262144 --variations-seed-version --mojo-platform-channel-handle=5792 /prefetch:82⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6260,i,5653370555654131728,11767898436129397404,262144 --variations-seed-version --mojo-platform-channel-handle=6344 /prefetch:82⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6232,i,5653370555654131728,11767898436129397404,262144 --variations-seed-version --mojo-platform-channel-handle=6496 /prefetch:82⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6288,i,5653370555654131728,11767898436129397404,262144 --variations-seed-version --mojo-platform-channel-handle=6296 /prefetch:82⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6376,i,5653370555654131728,11767898436129397404,262144 --variations-seed-version --mojo-platform-channel-handle=6228 /prefetch:82⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6560,i,5653370555654131728,11767898436129397404,262144 --variations-seed-version --mojo-platform-channel-handle=6868 /prefetch:82⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7008,i,5653370555654131728,11767898436129397404,262144 --variations-seed-version --mojo-platform-channel-handle=7016 /prefetch:82⤵PID:5156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6536,i,5653370555654131728,11767898436129397404,262144 --variations-seed-version --mojo-platform-channel-handle=6496 /prefetch:82⤵PID:5468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6548,i,5653370555654131728,11767898436129397404,262144 --variations-seed-version --mojo-platform-channel-handle=7184 /prefetch:82⤵PID:5564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5792,i,5653370555654131728,11767898436129397404,262144 --variations-seed-version --mojo-platform-channel-handle=564 /prefetch:82⤵PID:5152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4412,i,5653370555654131728,11767898436129397404,262144 --variations-seed-version --mojo-platform-channel-handle=3448 /prefetch:82⤵PID:5148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5916,i,5653370555654131728,11767898436129397404,262144 --variations-seed-version --mojo-platform-channel-handle=4464 /prefetch:82⤵PID:5548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5208,i,5653370555654131728,11767898436129397404,262144 --variations-seed-version --mojo-platform-channel-handle=3780 /prefetch:82⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6060,i,5653370555654131728,11767898436129397404,262144 --variations-seed-version --mojo-platform-channel-handle=6612 /prefetch:82⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5432,i,5653370555654131728,11767898436129397404,262144 --variations-seed-version --mojo-platform-channel-handle=6176 /prefetch:82⤵PID:5380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=7076,i,5653370555654131728,11767898436129397404,262144 --variations-seed-version --mojo-platform-channel-handle=7064 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7104,i,5653370555654131728,11767898436129397404,262144 --variations-seed-version --mojo-platform-channel-handle=7048 /prefetch:82⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:1856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160B
MD5c3911ceb35539db42e5654bdd60ac956
SHA171be0751e5fc583b119730dbceb2c723f2389f6c
SHA25631952875f8bb2e71f49231c95349945ffc0c1dd975f06309a0d138f002cfd23d
SHA512d8b2c7c5b7105a6f0c4bc9c79c05b1202bc8deb90e60a037fec59429c04fc688a745ee1a0d06a8311466b4d14e2921dfb4476104432178c01df1e99deb48b331
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
43B
MD5af3a9104ca46f35bb5f6123d89c25966
SHA11ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8
SHA25681bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea
SHA5126a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD54facd0ff10154cde70c99baa7df81001
SHA165267ea75bcb63edd2905e288d7b96b543708205
SHA256a13534df0cd0a79a3a1b91085a6d575b47d5a9aad7fc6d712fd2616c0e95a23b
SHA512ad8d2b965851c0ddc23e92ae151b3b0b2bcda850c446f4278bdb0754d6b42ead8fc034b394749578a27b33ad7e4ab0633f974dfd4773fbe4d93ae477f00b73f2
-
Filesize
280B
MD5049e5a246ed025dee243db0ba8e2984c
SHA115ec2d2b28dcfc17c1cfb5d0c13482d0706f942d
SHA25633071ca42c472861a2fabd0f82f8b03ef0daaa6796b24b83f3df02587e4c3d12
SHA512bc5f6fa6a8cae20ab40eae4552650d75f38ebb158c95288a79d9f332623bb507946513c39d19c00a5aee323df01f0f1a51c54594ef1c293289baf45f4ae2145b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5a74ee8600ffa03d53547b49773bef7a1
SHA17bc009c5cbd6b0a3eb4817b965dd4b2cb77c2308
SHA25624dc112af4f8480b0c4e25673872c2ea25e5e4ad9f2d4968f609788faec0d8e4
SHA512d801f179ed04c2cb9497eabac9ee20fa81f4a44431aa547383d5c21b715ecd237c27f1e4c66742941fbc7debd0d53163b7c6c95ca04adf40a61bf5b882593a24
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57fdb9.TMP
Filesize3KB
MD5735c47a0a8613b8dcd95fa135252ea15
SHA16250633edbd064c76451310557a574bc19107bca
SHA25619d9b63e381d92da5548c79d068cf03b3018d4ed3ef817c229fd3ac734449ddb
SHA512f9a2216610b44f999178f879655a0f9f19dcc3a342fd4ce7b6c4c8f1d1fb95af0b187fb8b46d53232e4f1ebb272e78e6edb60dd926a84bfee8ed5b2869e0248f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
3KB
MD580b74aab1a2a46e27ac5b4119acbdfbc
SHA164f61455e81b8edfd894af3d8a7b92557916d1f9
SHA256aad26f4613e557c1ec3eda7483b27e7808a218bb5884576033eff0227f5db45b
SHA512597c453e4c97e17d9b3f51126bb2a1e98795b028f3e0640522df92b81636fe79c2a8cace3f9d0600b092d67d59bcffab61b907b400dd85cf8638b786d8a92dc0
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
14KB
MD5b7c1728236c00b05ef013572158d812d
SHA145d884c965346900e62bd349eb1f0efec0bbf137
SHA256655b46e5549e259476124bf6a8795f30b13e3d0d109eeb57fc84a16fb515c0db
SHA512e4a85659b28dcc378d37a17b3de796de57af3cb5eb24db997cf080609dbc4d43f8e9e57206dbdfcc9e930b0931f110cf27da0a723d4a9cf94963c8478efc6d51
-
Filesize
15KB
MD5ca65c9ded7722365bfb7caf8a948656b
SHA192f697b6928b0c3b2c84acd603ef9da644a53f9d
SHA256b578cddc6152389fc919c75c26329ff4f631b8b73f1a0027a9f40051d6670c55
SHA51240003d909e289ee664748f2e99f0c6183e78bfef2a9961c04c40e44af9659d00e1fdead19dbced29e2bb42d9ef336c6dcada7b84a0bae3c4d501d8aaffa2314f
-
Filesize
36KB
MD5955be3aa1e25db8ef717d8f703a2cdc5
SHA11cef6ac9f3f3642dc62c239aaeae26c527e22b61
SHA2567586b80b5d4ec30dd21401a1f2f7745dcfacf882ac99a116ce68ce9bda538041
SHA512434c6e7e2ce0c2166ebe7fcc37493105ec117fd438b3985f380305159cc85ca0d717714e78b68a7f82936e8386db370e6eedbd15069b18272ed090d603bb91e9
-
Filesize
4KB
MD5933dd2604f265bb5124fbf13a45afc1f
SHA17c193f477f4d26fa4180ea1cce14c7c87baf1ac0
SHA256094905020322d9d8989da003660572862382e3302593dee09448c61af0ac871c
SHA5120255f8185f0332d7e7d21bd8209c732d7b6dace9bb584b71dd8e6e004c9600be94e9ddc0b626ba87375f6f025c54a97cbabc1f27a08946fae50b0be516b7d9d8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\25fd9c40-d60e-457b-928c-54eb0d7095c7.tmp
Filesize22KB
MD556a63f182b2938fbe3e59fbf9681dc08
SHA1b76578ca24fb20b8bd5dafad4296e5a46735a5e1
SHA25636edc2510fb072092e4c6b95efe4521857d9dcb7f0b45afdf5e8ef02e5d19593
SHA512b17246b7c61e26fce1f211311b578d6b3d22c03a042137bb2bb5b23018ce5290a8fbf7a34b2f66fa30b2027296b8a570478f66a144385c320d63c1cef64434f8
-
Filesize
23KB
MD55625a98eaf57d2de98be07662496be04
SHA140cf6c03001f30cb0ef8310b4e1fc97b9b9ff954
SHA256dcb0487d139c422f1ac60cca611a6deed619a2e97abb999403b41ca07007fa7e
SHA512c0cb4c5fd80210ebe1561c9bba6b70ddbd39d547f9f1e65e0a61e4f3c7ebe0fb946f2524b250610ebf6af2f58d9cfb94e792a44aad398a31ac89023a10a7bc3d
-
Filesize
872B
MD59166d225ef3c6005aab5ce2dda0a7850
SHA137b42bddeae1b00c88ba9839d8f48b14e0f7a5ba
SHA256d0e084ee5ea4d12d478738394ee60dc82f4b7f1c0b9fad8569ef67b069030482
SHA5122c9b2beef05bd649a178ff395b39784a29663d0197b188afed7a3272b49b7978d63c5d7a21ee1ff8d4bce5a9be2370b83fc619d131787673c8b416aa4d53c9ab
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog~RFe5899ca.TMP
Filesize465B
MD512a7078e946d0af1c2333bbbe806295a
SHA1899e6ba4f73cb393c5d07482631db313a7109877
SHA256bd94dc41f5245ac7e19c3cd6c51e8f05b6f5bacafef55432d1d63876458dfa71
SHA512210baacf37a8b776e5760b3f5ac24ef014ce8ca3bb1d9a806480f4b01f84da8b19c0eacf4d79e6fab52e990a2c5c07b350e3ed226b8bb5ed2c090dc59291f083
-
Filesize
30KB
MD5be43ade3603877a63a853bf885a9ec2d
SHA1603b71b789abe3fab0ddf58193f841ba268ed9a2
SHA256688cf9e263c15d452102712cb2917dc3d6a63525c479add001b6745e4c1dff76
SHA512aab1e374f5b3dca0300030f67658d4a9c282e0edc5d71a13eb87f939d7c15af5247f2302bc4df48e6df53be4e05f55aa6befd0c814fdd9f71d0c3e55d526b7b6
-
Filesize
34KB
MD5af47aa51243bbbe17575821ad84b771c
SHA1d803eff7880a15fae07e77af24ffe4c721a498b9
SHA25646bc912b78802102adc7d1c0e3b23882ba5e956b66d6dbbea6c71abe1fcb783d
SHA512bb6d24e3b52a5510c6174539faacf9807da8b738bcae71941040fdfc6e9d22757e50e918c30564190bfb6e31dc39ce48a45f8718000f2ddf6d3325d54f8dd50c
-
Filesize
6KB
MD586df6c0879f7005fe45554c40d8196f0
SHA182d0a920d7399598716bdfd8f3d6b927218f5a9a
SHA256560279da67bc8e23ece64d1bb1f04deab76de45dbc329f6eb1f1cc6252cf44a8
SHA5123fbfa69219e1ba6ef75588aff450d3324d8632b946f7902ece23ff960fffa7b8f8f7f9e526e2743d3c94474f41d13f02ca35e23520b6c06456125754b3efe2f9
-
Filesize
7KB
MD51ddf0bd9a42f23f1498dad78b529c590
SHA1261c5ba82fa54264d8e75d96124d656317e22633
SHA2563acf79405ca2d89b008c78776f1b6745839cf2f2c0b47f03d6b45bf308133857
SHA5120ab1784a28f5c91e32c4955824c7da26f27bb1f059e34266704f2a5775b7248046574b9ef3057b8a06ee137a047a0ccf854902d9ebb3b0a7f3a3c5df42889523
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\WorkspacesNavigationComponent\1.0.0.5\nav_config.json
Filesize2KB
MD5499d9e568b96e759959dc69635470211
SHA12462a315342e0c09fd6c5fbd7f1e7ff6914c17e6
SHA25698252dc9f9e81167e893f2c32f08ee60e9a6c43fadb454400ed3bff3a68fbf0d
SHA5123a5922697b5356fd29ccf8dcc2e5e0e8c1fd955046a5bacf11b8ac5b7c147625d31ade6ff17be86e79c2c613104b2d2aebb11557399084d422e304f287d8b905
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD52a87b33aa6e2242e5a5c74ec7303b0d0
SHA15c6c3df587a82246b197b338cce0f230336a45d5
SHA2561f8b1a2bbe525d910211cb27488a90d3ff76f32b0b5f12c8da7f272d30bf957c
SHA512f1782949ce7b955ad0e62493c1a05c578e27e4e52b636f6d17f20e7f0d96dc44997df822c6f1f268a3f8b76bedcf5c884ebe3413eb9cafcf9b1313655547f149
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir3148_1167531569\8a4d051f-e75c-400d-8508-b3247dd9241f.tmp
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de