Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
07-06-2021 06:45
Static task
static1
Behavioral task
behavioral1
Sample
33815ECF51B4A2F18811FBA9ED999D36.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
33815ECF51B4A2F18811FBA9ED999D36.exe
Resource
win10v20210410
General
-
Target
33815ECF51B4A2F18811FBA9ED999D36.exe
-
Size
2.5MB
-
MD5
33815ecf51b4a2f18811fba9ed999d36
-
SHA1
709cde4326af52f644cf00d260af65bdd0cbf5e1
-
SHA256
2f76ea148491b558111e852ce708f8802896c21c3b18239d14078f313822e301
-
SHA512
d3e1669d4e60d180a9bcd6b87f2c376be69bb7bebf6a73f0503ab65e4770354b71adcfc0688444ccf9a4d57fff32542f29bbcf12bc9686f347fa8ae8eaac82f5
Malware Config
Extracted
redline
002
piporopopo.com:54367
Signatures
-
DiamondFox
DiamondFox is a multipurpose botnet with many capabilities.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4832-185-0x0000000002540000-0x0000000002559000-memory.dmp family_redline behavioral2/memory/4832-187-0x00000000025C0000-0x00000000025D7000-memory.dmp family_redline -
Taurus Stealer Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2004-182-0x0000000000400000-0x0000000000646000-memory.dmp family_taurus_stealer -
DiamondFox payload 2 IoCs
Detects DiamondFox payload in file/memory.
Processes:
resource yara_rule behavioral2/memory/4424-169-0x0000000000400000-0x0000000000641000-memory.dmp diamondfox behavioral2/memory/5112-210-0x0000000000400000-0x0000000000641000-memory.dmp diamondfox -
Executes dropped EXE 16 IoCs
Processes:
der.dllcurl.dllautorun.dllautorun.exesistemes.dllMicrosoftEdgeCP.exelaun.dllMicrosoftEdgeCPS.exeder.exeTausuus.dllTausuus.exered.dllred.exegetmac.exepid process 2716 der.dll 4204 curl.dll 4480 autorun.dll 4604 autorun.exe 4688 sistemes.dll 4916 MicrosoftEdgeCP.exe 4952 laun.dll 5112 MicrosoftEdgeCPS.exe 2716 der.dll 4424 der.exe 4452 Tausuus.dll 2004 Tausuus.exe 4520 red.dll 4832 red.exe 5112 MicrosoftEdgeCPS.exe 2224 getmac.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
33815ECF51B4A2F18811FBA9ED999D36.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation 33815ECF51B4A2F18811FBA9ED999D36.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Explorer.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Time Manager = "C:\\ProgramData\\TimeManager.exe" Explorer.EXE -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 1 IoCs
Processes:
MicrosoftEdge.exedescription ioc process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4848 4604 WerFault.exe autorun.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Explorer.EXEdescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Explorer.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Explorer.EXE -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4224 timeout.exe -
Processes:
MicrosoftEdge.exebrowser_broker.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 2e91ed57685bd701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\InternetRegistry MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-SubSysId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\LastCleanup = 0000000000000000 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\MigrationTime = 301bd569d72dd701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{A8A88C49-5EB2-4990-A1A2-0876022 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 96669a42685bd701 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BingPageData MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta\generator$MediaWiki MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating\Rating Prompt Shown = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory\UUID = "{EDD157A1-7737-4C1C-9656-883B2EFDECD6}" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta\generator$http://www.typepad.com/ MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Root MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming\ChangeUnitGenerationNeeded = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BingPageData\RulesFileNextUpdateDate = "329210194" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. = 010000009ed95b7be809bb801065524aab8f1d33c65bf8ef7c13e33b4d9821d8db051a2d27c90474535bf844c210723b2bcd98a6bf808c0a26706039f11562e834f3 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\SharedCookie_MRACMigrationDone = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\PageSetup MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\ExtensionIn = "{B09AE6DA-5828-460B-89EB-63A8E6D4C3EA}" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionLow = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\EnableNegotiate = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main\OperationalData = "1" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DomainSuggestion\FileNames\ MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Extensible Cache MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active\{B2421D35-C052-4091-9756-FABB9A05D286} = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 2d3bf042685bd701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\LastCleanup = d4e45c49685bd701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\NextUpdateDate = "329862340" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DXFeatureLevel = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DontShowMeThisDialogAgain MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory\NextBrowserDataLogTime = c041dca79a5bd701 MicrosoftEdge.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
WerFault.exeMicrosoftEdgeCPS.exepowershell.exered.exepid process 4848 WerFault.exe 4848 WerFault.exe 4848 WerFault.exe 4848 WerFault.exe 4848 WerFault.exe 4848 WerFault.exe 4848 WerFault.exe 4848 WerFault.exe 4848 WerFault.exe 4848 WerFault.exe 4848 WerFault.exe 4848 WerFault.exe 4848 WerFault.exe 4848 WerFault.exe 4848 WerFault.exe 4848 WerFault.exe 4848 WerFault.exe 5112 MicrosoftEdgeCPS.exe 5112 MicrosoftEdgeCPS.exe 412 powershell.exe 412 powershell.exe 412 powershell.exe 412 powershell.exe 4832 red.exe 4832 red.exe 4832 red.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
MicrosoftEdgeCP.exepid process 4116 MicrosoftEdgeCP.exe 4116 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeWerFault.exeMicrosoftEdgeCPS.exeExplorer.EXEMicrosoftEdgeCP.exepowershell.exered.exedescription pid process Token: SeDebugPrivilege 2208 MicrosoftEdge.exe Token: SeDebugPrivilege 2208 MicrosoftEdge.exe Token: SeDebugPrivilege 2208 MicrosoftEdge.exe Token: SeDebugPrivilege 2208 MicrosoftEdge.exe Token: SeDebugPrivilege 4184 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4184 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4184 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4184 MicrosoftEdgeCP.exe Token: SeRestorePrivilege 4848 WerFault.exe Token: SeBackupPrivilege 4848 WerFault.exe Token: SeDebugPrivilege 4848 WerFault.exe Token: SeDebugPrivilege 5112 MicrosoftEdgeCPS.exe Token: SeShutdownPrivilege 2824 Explorer.EXE Token: SeCreatePagefilePrivilege 2824 Explorer.EXE Token: SeShutdownPrivilege 2824 Explorer.EXE Token: SeCreatePagefilePrivilege 2824 Explorer.EXE Token: SeShutdownPrivilege 2824 Explorer.EXE Token: SeCreatePagefilePrivilege 2824 Explorer.EXE Token: SeShutdownPrivilege 2824 Explorer.EXE Token: SeCreatePagefilePrivilege 2824 Explorer.EXE Token: SeShutdownPrivilege 2824 Explorer.EXE Token: SeCreatePagefilePrivilege 2824 Explorer.EXE Token: SeShutdownPrivilege 2824 Explorer.EXE Token: SeCreatePagefilePrivilege 2824 Explorer.EXE Token: SeShutdownPrivilege 2824 Explorer.EXE Token: SeCreatePagefilePrivilege 2824 Explorer.EXE Token: SeShutdownPrivilege 2824 Explorer.EXE Token: SeCreatePagefilePrivilege 2824 Explorer.EXE Token: SeShutdownPrivilege 2824 Explorer.EXE Token: SeCreatePagefilePrivilege 2824 Explorer.EXE Token: SeShutdownPrivilege 2824 Explorer.EXE Token: SeCreatePagefilePrivilege 2824 Explorer.EXE Token: SeShutdownPrivilege 2824 Explorer.EXE Token: SeCreatePagefilePrivilege 2824 Explorer.EXE Token: SeShutdownPrivilege 2824 Explorer.EXE Token: SeCreatePagefilePrivilege 2824 Explorer.EXE Token: SeShutdownPrivilege 2824 Explorer.EXE Token: SeCreatePagefilePrivilege 2824 Explorer.EXE Token: SeShutdownPrivilege 2824 Explorer.EXE Token: SeCreatePagefilePrivilege 2824 Explorer.EXE Token: SeShutdownPrivilege 2824 Explorer.EXE Token: SeCreatePagefilePrivilege 2824 Explorer.EXE Token: SeShutdownPrivilege 2824 Explorer.EXE Token: SeCreatePagefilePrivilege 2824 Explorer.EXE Token: SeShutdownPrivilege 2824 Explorer.EXE Token: SeCreatePagefilePrivilege 2824 Explorer.EXE Token: SeDebugPrivilege 4916 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4916 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 412 powershell.exe Token: SeDebugPrivilege 4832 red.exe Token: SeShutdownPrivilege 2824 Explorer.EXE Token: SeCreatePagefilePrivilege 2824 Explorer.EXE Token: SeShutdownPrivilege 2824 Explorer.EXE Token: SeCreatePagefilePrivilege 2824 Explorer.EXE Token: SeShutdownPrivilege 2824 Explorer.EXE Token: SeCreatePagefilePrivilege 2824 Explorer.EXE Token: SeShutdownPrivilege 2824 Explorer.EXE Token: SeCreatePagefilePrivilege 2824 Explorer.EXE Token: SeShutdownPrivilege 2824 Explorer.EXE Token: SeCreatePagefilePrivilege 2824 Explorer.EXE Token: SeShutdownPrivilege 2824 Explorer.EXE Token: SeCreatePagefilePrivilege 2824 Explorer.EXE Token: SeShutdownPrivilege 2824 Explorer.EXE Token: SeCreatePagefilePrivilege 2824 Explorer.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exepid process 2208 MicrosoftEdge.exe 4116 MicrosoftEdgeCP.exe 4116 MicrosoftEdgeCP.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 2824 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
33815ECF51B4A2F18811FBA9ED999D36.exeautorun.dllsistemes.dllMicrosoftEdgeCP.exeMicrosoftEdgeCP.exelaun.dllMicrosoftEdgeCPS.exeder.dllTausuus.dlldescription pid process target process PID 3892 wrote to memory of 2716 3892 33815ECF51B4A2F18811FBA9ED999D36.exe der.dll PID 3892 wrote to memory of 2716 3892 33815ECF51B4A2F18811FBA9ED999D36.exe der.dll PID 3892 wrote to memory of 2716 3892 33815ECF51B4A2F18811FBA9ED999D36.exe der.dll PID 3892 wrote to memory of 4204 3892 33815ECF51B4A2F18811FBA9ED999D36.exe curl.dll PID 3892 wrote to memory of 4204 3892 33815ECF51B4A2F18811FBA9ED999D36.exe curl.dll PID 3892 wrote to memory of 4204 3892 33815ECF51B4A2F18811FBA9ED999D36.exe curl.dll PID 3892 wrote to memory of 4480 3892 33815ECF51B4A2F18811FBA9ED999D36.exe autorun.dll PID 3892 wrote to memory of 4480 3892 33815ECF51B4A2F18811FBA9ED999D36.exe autorun.dll PID 3892 wrote to memory of 4480 3892 33815ECF51B4A2F18811FBA9ED999D36.exe autorun.dll PID 4480 wrote to memory of 4604 4480 autorun.dll autorun.exe PID 4480 wrote to memory of 4604 4480 autorun.dll autorun.exe PID 4480 wrote to memory of 4604 4480 autorun.dll autorun.exe PID 3892 wrote to memory of 4688 3892 33815ECF51B4A2F18811FBA9ED999D36.exe sistemes.dll PID 3892 wrote to memory of 4688 3892 33815ECF51B4A2F18811FBA9ED999D36.exe sistemes.dll PID 3892 wrote to memory of 4688 3892 33815ECF51B4A2F18811FBA9ED999D36.exe sistemes.dll PID 4688 wrote to memory of 4916 4688 sistemes.dll MicrosoftEdgeCP.exe PID 4688 wrote to memory of 4916 4688 sistemes.dll MicrosoftEdgeCP.exe PID 4688 wrote to memory of 4916 4688 sistemes.dll MicrosoftEdgeCP.exe PID 3892 wrote to memory of 4952 3892 33815ECF51B4A2F18811FBA9ED999D36.exe laun.dll PID 3892 wrote to memory of 4952 3892 33815ECF51B4A2F18811FBA9ED999D36.exe laun.dll PID 3892 wrote to memory of 4952 3892 33815ECF51B4A2F18811FBA9ED999D36.exe laun.dll PID 4116 wrote to memory of 4184 4116 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4116 wrote to memory of 4184 4116 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4116 wrote to memory of 4184 4116 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4916 wrote to memory of 5040 4916 MicrosoftEdgeCP.exe schtasks.exe PID 4916 wrote to memory of 5040 4916 MicrosoftEdgeCP.exe schtasks.exe PID 4916 wrote to memory of 5040 4916 MicrosoftEdgeCP.exe schtasks.exe PID 4952 wrote to memory of 5112 4952 laun.dll MicrosoftEdgeCPS.exe PID 4952 wrote to memory of 5112 4952 laun.dll MicrosoftEdgeCPS.exe PID 4952 wrote to memory of 5112 4952 laun.dll MicrosoftEdgeCPS.exe PID 4116 wrote to memory of 4184 4116 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4116 wrote to memory of 4184 4116 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4116 wrote to memory of 4184 4116 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4116 wrote to memory of 4184 4116 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4116 wrote to memory of 4184 4116 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4116 wrote to memory of 4184 4116 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4116 wrote to memory of 4184 4116 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4116 wrote to memory of 4184 4116 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 3892 wrote to memory of 2716 3892 33815ECF51B4A2F18811FBA9ED999D36.exe der.dll PID 3892 wrote to memory of 2716 3892 33815ECF51B4A2F18811FBA9ED999D36.exe der.dll PID 3892 wrote to memory of 2716 3892 33815ECF51B4A2F18811FBA9ED999D36.exe der.dll PID 5112 wrote to memory of 2824 5112 MicrosoftEdgeCPS.exe Explorer.EXE PID 5112 wrote to memory of 2824 5112 MicrosoftEdgeCPS.exe Explorer.EXE PID 5112 wrote to memory of 2824 5112 MicrosoftEdgeCPS.exe Explorer.EXE PID 5112 wrote to memory of 2824 5112 MicrosoftEdgeCPS.exe Explorer.EXE PID 5112 wrote to memory of 2824 5112 MicrosoftEdgeCPS.exe Explorer.EXE PID 5112 wrote to memory of 2824 5112 MicrosoftEdgeCPS.exe Explorer.EXE PID 5112 wrote to memory of 2824 5112 MicrosoftEdgeCPS.exe Explorer.EXE PID 5112 wrote to memory of 2824 5112 MicrosoftEdgeCPS.exe Explorer.EXE PID 5112 wrote to memory of 2824 5112 MicrosoftEdgeCPS.exe Explorer.EXE PID 5112 wrote to memory of 2824 5112 MicrosoftEdgeCPS.exe Explorer.EXE PID 5112 wrote to memory of 2824 5112 MicrosoftEdgeCPS.exe Explorer.EXE PID 4116 wrote to memory of 4184 4116 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2716 wrote to memory of 4424 2716 der.dll der.exe PID 2716 wrote to memory of 4424 2716 der.dll der.exe PID 2716 wrote to memory of 4424 2716 der.dll der.exe PID 3892 wrote to memory of 4452 3892 33815ECF51B4A2F18811FBA9ED999D36.exe Tausuus.dll PID 3892 wrote to memory of 4452 3892 33815ECF51B4A2F18811FBA9ED999D36.exe Tausuus.dll PID 3892 wrote to memory of 4452 3892 33815ECF51B4A2F18811FBA9ED999D36.exe Tausuus.dll PID 4116 wrote to memory of 4184 4116 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4116 wrote to memory of 4184 4116 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4452 wrote to memory of 2004 4452 Tausuus.dll Tausuus.exe PID 4452 wrote to memory of 2004 4452 Tausuus.dll Tausuus.exe PID 4452 wrote to memory of 2004 4452 Tausuus.dll Tausuus.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
-
C:\Users\Admin\AppData\Local\Temp\33815ECF51B4A2F18811FBA9ED999D36.exe"C:\Users\Admin\AppData\Local\Temp\33815ECF51B4A2F18811FBA9ED999D36.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Control.dll"C:\Users\Admin\AppData\Roaming\Control.dll" -s -psfgvedfsbetdfhgbefsdtgretgdhdgersfhbetfsgrsfhasgsdg3⤵
-
C:\Users\Admin\AppData\Roaming\curl.dll"C:\Users\Admin\AppData\Roaming\curl.dll" -s -pfhnrstya4rfhjnterast24wrhetfygr3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\autorun.dll"C:\Users\Admin\AppData\Roaming\autorun.dll" -s -pfhnrstya4rfhjnterast24wrhetfygr3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\autorun.exe"C:\Users\Admin\AppData\Roaming\autorun.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 8885⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\sistemes.dll"C:\Users\Admin\AppData\Roaming\sistemes.dll" -s -pfhnrstya4rfhjnterast24wrhetfygr3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\sistemes.exe"C:\Users\Admin\AppData\Roaming\sistemes.exe"4⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn Windows\MicrosoftVisualStudio /tr "C:\ProgramData\Microsoft Visual Studio\getmac.exe" /st 00:00 /sc once /du 9999:59 /ri 1 /f5⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\laun.dll"C:\Users\Admin\AppData\Roaming\laun.dll" -s -pfhnrstya4rfhjnterast24wrhetfygr3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\laun.exe"C:\Users\Admin\AppData\Roaming\laun.exe"4⤵
-
C:\Users\Admin\AppData\Roaming\der.dll"C:\Users\Admin\AppData\Roaming\der.dll" -s -pfhnrstya4rfhjnterast24wrhetfygr3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\der.exe"C:\Users\Admin\AppData\Roaming\der.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe"C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableRealtimeMonitoring 16⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\Tausuus.dll"C:\Users\Admin\AppData\Roaming\Tausuus.dll" -s -pfhnrstya4rfhjnterast24wrhetfygr3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Tausuus.exe"C:\Users\Admin\AppData\Roaming\Tausuus.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\Tausuus.exe5⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 36⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\red.dll"C:\Users\Admin\AppData\Roaming\red.dll" -s -pfhnrstya4rfhjnterast24wrhetfygr3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\red.exe"C:\Users\Admin\AppData\Roaming\red.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\ProgramData\Microsoft Visual Studio\getmac.exe"C:\ProgramData\Microsoft Visual Studio\getmac.exe"1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft Visual Studio\getmac.exeMD5
433b5d3a94f8c4d203dfd059d6195322
SHA1442eb95aa07a6a5f939e0d2e03251f88f4d6ffed
SHA256608d2c68c14bca567b4aece4c2aa6d8ed866c767ff68404e86a6443168cac8d6
SHA51273a83bb5b35f43e502b14bbc221ad7b251751e724fd4ec1a73402757166fd4b5270e45adc33e28daac40822420c546d5785fba6746b48a2591519e5ae029d06c
-
C:\ProgramData\Microsoft Visual Studio\getmac.exeMD5
433b5d3a94f8c4d203dfd059d6195322
SHA1442eb95aa07a6a5f939e0d2e03251f88f4d6ffed
SHA256608d2c68c14bca567b4aece4c2aa6d8ed866c767ff68404e86a6443168cac8d6
SHA51273a83bb5b35f43e502b14bbc221ad7b251751e724fd4ec1a73402757166fd4b5270e45adc33e28daac40822420c546d5785fba6746b48a2591519e5ae029d06c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\MCAB2IIA.cookieMD5
a65178716f490c6c90572bcd8be013f1
SHA1ccbc65e381914ba0a3aef83e0db78b41ec1508bd
SHA256d8aeb3d6dcc9edf08947a7ab8130543ee47b51ddba11163af1d7544bc397baf9
SHA5123addb57e3a4e1289424463453e4f7098ecdd5f8fc315ff613368ea62e9d03358f3c72370ec1bfb869d75dbe072dd4c96abdd8e806cd6e128c212054266ad990d
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\VEFBYPD1.cookieMD5
267c0959177359bec282d888deae9143
SHA16c79f8c8e487267839816c12bdbd4b01483b3436
SHA256f9a1313406c40f8c9a335b74a7adcc4338cab1564dcd3a7d72e87338207863ec
SHA51228a13179a4153d0f185368cd8f300d24554cedf350ee1bfd2939ba851a5ac0276fa53f32ca8504a930beaae4a72488348a7b299426478a846c2a553e357b4f1b
-
C:\Users\Admin\AppData\Roaming\Control.dllMD5
c335d5a0017bfcbdcfa5a0f864351081
SHA1774607298d15bd1cbfb17e607567fd2c02572615
SHA256b023682af434ef733decd131570a83384f43792ad327815b7445132f59438577
SHA512f1cffb3bef22d15b6f387179fc51c8376589cf37b289b3423dd0d4cd50a4ce9686d8f578a75e170bb5676735104d73817905b03020762ac99b548673c9e43d9b
-
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exeMD5
7d17f55dcad4fd9b8260a1477d1c5737
SHA1623e87d0197dd0a3833b4949f01ef6e64364ceb7
SHA2562de55e087886d1f809d688e8d37ce081e7624150f725b800dc40735c425dd316
SHA51257e4bab443cb29e862046b3fa9e64dd95c9f0feba9a6ad58342e384a7a61824ff4088736fa55fedd5cef1175aa1c1bf8e15229f58b5b54ce58af70b68c8ed5cc
-
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exeMD5
7d17f55dcad4fd9b8260a1477d1c5737
SHA1623e87d0197dd0a3833b4949f01ef6e64364ceb7
SHA2562de55e087886d1f809d688e8d37ce081e7624150f725b800dc40735c425dd316
SHA51257e4bab443cb29e862046b3fa9e64dd95c9f0feba9a6ad58342e384a7a61824ff4088736fa55fedd5cef1175aa1c1bf8e15229f58b5b54ce58af70b68c8ed5cc
-
C:\Users\Admin\AppData\Roaming\Tausuus.dllMD5
4928f41ec8e25b801d5fd3085f356811
SHA13f1a6074412172643e568de1494a9d729842a7ce
SHA256a1e852ebf665af957c8fc0691520fb1a5da54183cd826e162f8d9a69122ff46d
SHA5128fd9bdac4b1739c0daeb7353255e5df78842e770b3adbb16fe4e6c26058b5b543a914f2fb49427836bb827b8a00e60cd4331e3b94ac98d6b5b9ef41d0a85db6e
-
C:\Users\Admin\AppData\Roaming\Tausuus.dllMD5
4928f41ec8e25b801d5fd3085f356811
SHA13f1a6074412172643e568de1494a9d729842a7ce
SHA256a1e852ebf665af957c8fc0691520fb1a5da54183cd826e162f8d9a69122ff46d
SHA5128fd9bdac4b1739c0daeb7353255e5df78842e770b3adbb16fe4e6c26058b5b543a914f2fb49427836bb827b8a00e60cd4331e3b94ac98d6b5b9ef41d0a85db6e
-
C:\Users\Admin\AppData\Roaming\Tausuus.exeMD5
9e391cff6b4f9f2196bd24ddf85b1bd9
SHA168d02e75d870b2bb31c66bb804ad71e2decdcbdc
SHA256abcac4eef0ce9e5bf5a0834b4238944b54180c8a2ac76b77368b7e308a91cb8a
SHA51298721a6af54d6374a96d52d4992aa96a5ee15ea83f44057100d59b2c1643f7a829f8faac49f8918288e7b0b2644c6983a11f18b0ba9293e14f50d5611a4c1da0
-
C:\Users\Admin\AppData\Roaming\Tausuus.exeMD5
9e391cff6b4f9f2196bd24ddf85b1bd9
SHA168d02e75d870b2bb31c66bb804ad71e2decdcbdc
SHA256abcac4eef0ce9e5bf5a0834b4238944b54180c8a2ac76b77368b7e308a91cb8a
SHA51298721a6af54d6374a96d52d4992aa96a5ee15ea83f44057100d59b2c1643f7a829f8faac49f8918288e7b0b2644c6983a11f18b0ba9293e14f50d5611a4c1da0
-
C:\Users\Admin\AppData\Roaming\autorun.dllMD5
4cc5f2747f557f12f71233a19a6f4872
SHA11bae92d558dcf5def8b64a5df7e5b3285410d67e
SHA2565a740d5e7eb5d3b391a79c892bbb8f0eed0fa619f0de7275b068d58393e8e45c
SHA512131db8322fb730394fe683dba0b0f1159cf56f39cb4f803c7c124fcd403477dbeb5bf67c88b93c0af3f47dd43983d1876d72637c9fbf4d5ecb777d98107981c0
-
C:\Users\Admin\AppData\Roaming\autorun.dllMD5
4cc5f2747f557f12f71233a19a6f4872
SHA11bae92d558dcf5def8b64a5df7e5b3285410d67e
SHA2565a740d5e7eb5d3b391a79c892bbb8f0eed0fa619f0de7275b068d58393e8e45c
SHA512131db8322fb730394fe683dba0b0f1159cf56f39cb4f803c7c124fcd403477dbeb5bf67c88b93c0af3f47dd43983d1876d72637c9fbf4d5ecb777d98107981c0
-
C:\Users\Admin\AppData\Roaming\autorun.exeMD5
26434cdde23db00971d8f5ecc8ed5375
SHA18dcd79398483be9f740eafbd5baedb269df71885
SHA2568c64d40709d14fa07a95632bd1fef103cc0bb60ae48520b61b1d789801f8aa80
SHA5127bdcc2e16854c6864c8863fbb496d6fa606a9b34a02315b778efd2c9fca60a7c5a631ad61f1241b3b56c1af33a3ad440ff7e9388575624ec340744522cfd755f
-
C:\Users\Admin\AppData\Roaming\autorun.exeMD5
26434cdde23db00971d8f5ecc8ed5375
SHA18dcd79398483be9f740eafbd5baedb269df71885
SHA2568c64d40709d14fa07a95632bd1fef103cc0bb60ae48520b61b1d789801f8aa80
SHA5127bdcc2e16854c6864c8863fbb496d6fa606a9b34a02315b778efd2c9fca60a7c5a631ad61f1241b3b56c1af33a3ad440ff7e9388575624ec340744522cfd755f
-
C:\Users\Admin\AppData\Roaming\control.dllMD5
c335d5a0017bfcbdcfa5a0f864351081
SHA1774607298d15bd1cbfb17e607567fd2c02572615
SHA256b023682af434ef733decd131570a83384f43792ad327815b7445132f59438577
SHA512f1cffb3bef22d15b6f387179fc51c8376589cf37b289b3423dd0d4cd50a4ce9686d8f578a75e170bb5676735104d73817905b03020762ac99b548673c9e43d9b
-
C:\Users\Admin\AppData\Roaming\curl.dllMD5
4c6479d3802ba659cdeec4b8d3f02005
SHA1cec95476c3de6a3f37792e309f32a4efc930163b
SHA256ab10b694a60e30e6e0e30b2b16cf5260128077e141818d10bc0be956bdb6a9c5
SHA5124261ad523178143a7a4bec363422c56f778bf842841b32291cc183255fb66ea586f17a1d2860bf4232b054c15d9c3e1780a5931ff5ac02d938a1ff9d5d21fe3d
-
C:\Users\Admin\AppData\Roaming\curl.dllMD5
4c6479d3802ba659cdeec4b8d3f02005
SHA1cec95476c3de6a3f37792e309f32a4efc930163b
SHA256ab10b694a60e30e6e0e30b2b16cf5260128077e141818d10bc0be956bdb6a9c5
SHA5124261ad523178143a7a4bec363422c56f778bf842841b32291cc183255fb66ea586f17a1d2860bf4232b054c15d9c3e1780a5931ff5ac02d938a1ff9d5d21fe3d
-
C:\Users\Admin\AppData\Roaming\der.dllMD5
5d22a3a110b79f9f0bfcb26be6c8ebfc
SHA178098a1f9eaec11a8ebcc7fd605c10625ea2e815
SHA25620e6cd5689770f838555f99d85bf6bfcb31d9c39b6b62d9d43c13493ef97532f
SHA512c0ce4a028758b1ed4458b4dcc84db9fd9c2d2a8a364e5dbc3cb7082a680b795c3b68aa9c9932c99a3d4e1684a490abf371905a3b970f4484fd5b2ded5d9aed84
-
C:\Users\Admin\AppData\Roaming\der.exeMD5
7d17f55dcad4fd9b8260a1477d1c5737
SHA1623e87d0197dd0a3833b4949f01ef6e64364ceb7
SHA2562de55e087886d1f809d688e8d37ce081e7624150f725b800dc40735c425dd316
SHA51257e4bab443cb29e862046b3fa9e64dd95c9f0feba9a6ad58342e384a7a61824ff4088736fa55fedd5cef1175aa1c1bf8e15229f58b5b54ce58af70b68c8ed5cc
-
C:\Users\Admin\AppData\Roaming\der.exeMD5
7d17f55dcad4fd9b8260a1477d1c5737
SHA1623e87d0197dd0a3833b4949f01ef6e64364ceb7
SHA2562de55e087886d1f809d688e8d37ce081e7624150f725b800dc40735c425dd316
SHA51257e4bab443cb29e862046b3fa9e64dd95c9f0feba9a6ad58342e384a7a61824ff4088736fa55fedd5cef1175aa1c1bf8e15229f58b5b54ce58af70b68c8ed5cc
-
C:\Users\Admin\AppData\Roaming\laun.dllMD5
4f4df22a6bbb3c20f0db2fbbc357e719
SHA186d0949d8f2e5249fcdccb350b44f038767d7308
SHA256e52e0d72ee811680544c3ea89b6fafead8ffc07af9de0a1c6f0009d321e7f910
SHA512a63e7f48d82bdc9e8d19ebe366f6f674409b0073e0b9047de99c844538b777f5c3453dab96e82a4a2e3b6ae9d50a11b83e8dbf69de4e46a9ac46f79fd14f43da
-
C:\Users\Admin\AppData\Roaming\laun.dllMD5
4f4df22a6bbb3c20f0db2fbbc357e719
SHA186d0949d8f2e5249fcdccb350b44f038767d7308
SHA256e52e0d72ee811680544c3ea89b6fafead8ffc07af9de0a1c6f0009d321e7f910
SHA512a63e7f48d82bdc9e8d19ebe366f6f674409b0073e0b9047de99c844538b777f5c3453dab96e82a4a2e3b6ae9d50a11b83e8dbf69de4e46a9ac46f79fd14f43da
-
C:\Users\Admin\AppData\Roaming\laun.exeMD5
8d91fdf3c873c858c602c14fd2b8c92c
SHA18a259e800f7c8d3b8de29668794322670f375cc5
SHA256e15c88bf4aa450851de6579e303a7672bb89d715f2ea6589fe2531a2a9e51313
SHA5125f1eae2b240d4b110abc758cda5bbf39aeee22c6bd4028e23759f93ff4c376bc7583a0a8cbf22604444d112bfff73758a6b09a897517c4b813872546b179a21a
-
C:\Users\Admin\AppData\Roaming\laun.exeMD5
8d91fdf3c873c858c602c14fd2b8c92c
SHA18a259e800f7c8d3b8de29668794322670f375cc5
SHA256e15c88bf4aa450851de6579e303a7672bb89d715f2ea6589fe2531a2a9e51313
SHA5125f1eae2b240d4b110abc758cda5bbf39aeee22c6bd4028e23759f93ff4c376bc7583a0a8cbf22604444d112bfff73758a6b09a897517c4b813872546b179a21a
-
C:\Users\Admin\AppData\Roaming\red.dllMD5
067d15413cde6640da9387cc6aaa5855
SHA1ef64a8b1532adb4bfa9dd29c69ce18589dafa390
SHA25611de57f2b959230c708377829070219efd2185f8eeca467bdcf6c59775c89b2b
SHA5126a6b70318842a2052302b5d1f6bac5364af1aa2f07cf7bfb91e6e84363c72e68d9a9d99ed0139ecfd51b872960b945aa28f3ba0e1a1329efab7038518e4442a1
-
C:\Users\Admin\AppData\Roaming\red.dllMD5
067d15413cde6640da9387cc6aaa5855
SHA1ef64a8b1532adb4bfa9dd29c69ce18589dafa390
SHA25611de57f2b959230c708377829070219efd2185f8eeca467bdcf6c59775c89b2b
SHA5126a6b70318842a2052302b5d1f6bac5364af1aa2f07cf7bfb91e6e84363c72e68d9a9d99ed0139ecfd51b872960b945aa28f3ba0e1a1329efab7038518e4442a1
-
C:\Users\Admin\AppData\Roaming\red.exeMD5
cefb5b22d57d94e2087e86bf2279a5b1
SHA13ae2fd666f6bc496b2bb5db484097fd1b74015ca
SHA256d0491d4230a2db44a109358edc1bc4ab836f5f878565ca0ca8db6ad30abc2d1a
SHA512a3bde96e6a667ca4a0094231886da4c64cc4149d5024f285d5f6147d1680858e5aa2a4b37155505e6b07e4d6dbf366bf6399344be9ffeaa3f099102a0f83560c
-
C:\Users\Admin\AppData\Roaming\red.exeMD5
cefb5b22d57d94e2087e86bf2279a5b1
SHA13ae2fd666f6bc496b2bb5db484097fd1b74015ca
SHA256d0491d4230a2db44a109358edc1bc4ab836f5f878565ca0ca8db6ad30abc2d1a
SHA512a3bde96e6a667ca4a0094231886da4c64cc4149d5024f285d5f6147d1680858e5aa2a4b37155505e6b07e4d6dbf366bf6399344be9ffeaa3f099102a0f83560c
-
C:\Users\Admin\AppData\Roaming\sistemes.dllMD5
5979f9b5b7114fb6a710b3ef8c82f71d
SHA10a5ff124a35ec1b769f4b8732a0a3289986faf99
SHA25668a4aad1483213e0f94c99bc5288fb31a1c37e4ef44974a4221ed810d941ba6c
SHA51227ff3ed32de1d65242722b6e4eafd68da094dbeb215712da2f2a8af3b3b7d395acc0d93d3b04681415765f7b414dc17e6c3087f767b6260ebd4b5ca09b1b481e
-
C:\Users\Admin\AppData\Roaming\sistemes.dllMD5
5979f9b5b7114fb6a710b3ef8c82f71d
SHA10a5ff124a35ec1b769f4b8732a0a3289986faf99
SHA25668a4aad1483213e0f94c99bc5288fb31a1c37e4ef44974a4221ed810d941ba6c
SHA51227ff3ed32de1d65242722b6e4eafd68da094dbeb215712da2f2a8af3b3b7d395acc0d93d3b04681415765f7b414dc17e6c3087f767b6260ebd4b5ca09b1b481e
-
C:\Users\Admin\AppData\Roaming\sistemes.exeMD5
433b5d3a94f8c4d203dfd059d6195322
SHA1442eb95aa07a6a5f939e0d2e03251f88f4d6ffed
SHA256608d2c68c14bca567b4aece4c2aa6d8ed866c767ff68404e86a6443168cac8d6
SHA51273a83bb5b35f43e502b14bbc221ad7b251751e724fd4ec1a73402757166fd4b5270e45adc33e28daac40822420c546d5785fba6746b48a2591519e5ae029d06c
-
C:\Users\Admin\AppData\Roaming\sistemes.exeMD5
433b5d3a94f8c4d203dfd059d6195322
SHA1442eb95aa07a6a5f939e0d2e03251f88f4d6ffed
SHA256608d2c68c14bca567b4aece4c2aa6d8ed866c767ff68404e86a6443168cac8d6
SHA51273a83bb5b35f43e502b14bbc221ad7b251751e724fd4ec1a73402757166fd4b5270e45adc33e28daac40822420c546d5785fba6746b48a2591519e5ae029d06c
-
memory/412-207-0x0000000007350000-0x0000000007351000-memory.dmpFilesize
4KB
-
memory/412-205-0x00000000048E0000-0x00000000048E1000-memory.dmpFilesize
4KB
-
memory/412-212-0x0000000004A10000-0x0000000004A11000-memory.dmpFilesize
4KB
-
memory/412-249-0x0000000004A13000-0x0000000004A14000-memory.dmpFilesize
4KB
-
memory/412-211-0x0000000007D30000-0x0000000007D31000-memory.dmpFilesize
4KB
-
memory/412-239-0x0000000009700000-0x0000000009701000-memory.dmpFilesize
4KB
-
memory/412-209-0x0000000007C50000-0x0000000007C51000-memory.dmpFilesize
4KB
-
memory/412-215-0x0000000007AA0000-0x0000000007AA1000-memory.dmpFilesize
4KB
-
memory/412-238-0x000000007E770000-0x000000007E771000-memory.dmpFilesize
4KB
-
memory/412-206-0x00000000073D0000-0x00000000073D1000-memory.dmpFilesize
4KB
-
memory/412-213-0x0000000004A12000-0x0000000004A13000-memory.dmpFilesize
4KB
-
memory/412-214-0x0000000007DA0000-0x0000000007DA1000-memory.dmpFilesize
4KB
-
memory/412-237-0x00000000095B0000-0x00000000095B1000-memory.dmpFilesize
4KB
-
memory/412-202-0x0000000000000000-mapping.dmp
-
memory/412-217-0x00000000083D0000-0x00000000083D1000-memory.dmpFilesize
4KB
-
memory/412-225-0x0000000009180000-0x00000000091B3000-memory.dmpFilesize
204KB
-
memory/412-232-0x0000000009160000-0x0000000009161000-memory.dmpFilesize
4KB
-
memory/2004-182-0x0000000000400000-0x0000000000646000-memory.dmpFilesize
2.3MB
-
memory/2004-180-0x0000000000100000-0x00000000001AE000-memory.dmpFilesize
696KB
-
memory/2004-170-0x0000000000000000-mapping.dmp
-
memory/2224-255-0x0000000000400000-0x0000000000628000-memory.dmpFilesize
2.2MB
-
memory/2716-114-0x0000000000000000-mapping.dmp
-
memory/2716-152-0x0000000000000000-mapping.dmp
-
memory/2824-159-0x0000000000EF0000-0x0000000000F05000-memory.dmpFilesize
84KB
-
memory/4204-119-0x0000000000000000-mapping.dmp
-
memory/4224-251-0x0000000000000000-mapping.dmp
-
memory/4424-169-0x0000000000400000-0x0000000000641000-memory.dmpFilesize
2.3MB
-
memory/4424-160-0x0000000000000000-mapping.dmp
-
memory/4428-250-0x0000000000000000-mapping.dmp
-
memory/4452-163-0x0000000000000000-mapping.dmp
-
memory/4480-123-0x0000000000000000-mapping.dmp
-
memory/4520-173-0x0000000000000000-mapping.dmp
-
memory/4604-128-0x0000000000000000-mapping.dmp
-
memory/4604-143-0x0000000000400000-0x0000000000617000-memory.dmpFilesize
2.1MB
-
memory/4604-140-0x0000000000120000-0x0000000000121000-memory.dmpFilesize
4KB
-
memory/4688-131-0x0000000000000000-mapping.dmp
-
memory/4832-191-0x0000000004B60000-0x0000000004B61000-memory.dmpFilesize
4KB
-
memory/4832-183-0x0000000000100000-0x00000000001AE000-memory.dmpFilesize
696KB
-
memory/4832-192-0x0000000004B62000-0x0000000004B63000-memory.dmpFilesize
4KB
-
memory/4832-196-0x0000000005100000-0x0000000005101000-memory.dmpFilesize
4KB
-
memory/4832-193-0x0000000004B63000-0x0000000004B64000-memory.dmpFilesize
4KB
-
memory/4832-195-0x0000000004A60000-0x0000000004A61000-memory.dmpFilesize
4KB
-
memory/4832-190-0x00000000049F0000-0x00000000049F1000-memory.dmpFilesize
4KB
-
memory/4832-189-0x00000000049D0000-0x00000000049D1000-memory.dmpFilesize
4KB
-
memory/4832-188-0x0000000005680000-0x0000000005681000-memory.dmpFilesize
4KB
-
memory/4832-187-0x00000000025C0000-0x00000000025D7000-memory.dmpFilesize
92KB
-
memory/4832-186-0x0000000004B70000-0x0000000004B71000-memory.dmpFilesize
4KB
-
memory/4832-185-0x0000000002540000-0x0000000002559000-memory.dmpFilesize
100KB
-
memory/4832-184-0x0000000000400000-0x000000000063B000-memory.dmpFilesize
2.2MB
-
memory/4832-194-0x0000000004B64000-0x0000000004B66000-memory.dmpFilesize
8KB
-
memory/4832-178-0x0000000000000000-mapping.dmp
-
memory/4832-240-0x0000000005F70000-0x0000000005F71000-memory.dmpFilesize
4KB
-
memory/4916-136-0x0000000000000000-mapping.dmp
-
memory/4916-146-0x0000000000400000-0x0000000000628000-memory.dmpFilesize
2.2MB
-
memory/4952-139-0x0000000000000000-mapping.dmp
-
memory/5040-148-0x0000000000000000-mapping.dmp
-
memory/5112-199-0x0000000000000000-mapping.dmp
-
memory/5112-210-0x0000000000400000-0x0000000000641000-memory.dmpFilesize
2.3MB
-
memory/5112-158-0x0000000000110000-0x0000000000111000-memory.dmpFilesize
4KB
-
memory/5112-157-0x0000000000400000-0x0000000000635000-memory.dmpFilesize
2.2MB
-
memory/5112-149-0x0000000000000000-mapping.dmp