Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220331-en -
submitted
30-03-2022 02:35
Static task
static1
Behavioral task
behavioral1
Sample
7e997a0cd3967a8010e9fe1d78e29dbcfc4c84abc33537dec2b677d7fad57d7f.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
7e997a0cd3967a8010e9fe1d78e29dbcfc4c84abc33537dec2b677d7fad57d7f.exe
Resource
win10v2004-20220331-en
General
-
Target
7e997a0cd3967a8010e9fe1d78e29dbcfc4c84abc33537dec2b677d7fad57d7f.exe
-
Size
2.2MB
-
MD5
3b9508873f316fcd7a8c327896526809
-
SHA1
5592790f1989c4afafa1d37d7bc1c6e8c4c56111
-
SHA256
7e997a0cd3967a8010e9fe1d78e29dbcfc4c84abc33537dec2b677d7fad57d7f
-
SHA512
848e5f6267f8f4a7eb456d5744a8c83c66381bb650498d97955d667005328a30bf45c5c862a6a3503d9eb47aac13bc6684ce4383504fe57fde77b37d63355f42
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 2 IoCs
Processes:
Wfmzantzeocxy.exeGgtlzx.exepid Process 4524 Wfmzantzeocxy.exe 2944 Ggtlzx.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Wfmzantzeocxy.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Wfmzantzeocxy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Wfmzantzeocxy.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7e997a0cd3967a8010e9fe1d78e29dbcfc4c84abc33537dec2b677d7fad57d7f.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1082102374-1487407228-1886994731-1000\Control Panel\International\Geo\Nation 7e997a0cd3967a8010e9fe1d78e29dbcfc4c84abc33537dec2b677d7fad57d7f.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
Wfmzantzeocxy.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-1082102374-1487407228-1886994731-1000\Software\Wine Wfmzantzeocxy.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Wfmzantzeocxy.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-1082102374-1487407228-1886994731-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Wfmzantzeocxy.exe Key opened \REGISTRY\USER\S-1-5-21-1082102374-1487407228-1886994731-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Wfmzantzeocxy.exe Key opened \REGISTRY\USER\S-1-5-21-1082102374-1487407228-1886994731-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Wfmzantzeocxy.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
msedge.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1082102374-1487407228-1886994731-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
Wfmzantzeocxy.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Wfmzantzeocxy.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 88 ip-api.com 1 api.ipify.org 2 api.ipify.org -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
Wfmzantzeocxy.exedescription ioc Process File opened for modification \??\PhysicalDrive0 Wfmzantzeocxy.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Wfmzantzeocxy.exepid Process 4524 Wfmzantzeocxy.exe -
Drops file in Program Files directory 2 IoCs
Processes:
setup.exedescription ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\8c102094-4728-44fa-95cc-684303669150.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20220401003838.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1596 4524 WerFault.exe 77 -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
Wfmzantzeocxy.exemsedge.exemsedge.exeidentity_helper.exemsedge.exepid Process 4524 Wfmzantzeocxy.exe 4524 Wfmzantzeocxy.exe 4016 msedge.exe 4016 msedge.exe 904 msedge.exe 904 msedge.exe 4524 Wfmzantzeocxy.exe 4524 Wfmzantzeocxy.exe 4776 identity_helper.exe 4776 identity_helper.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid Process 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Ggtlzx.exeWfmzantzeocxy.exedescription pid Process Token: SeDebugPrivilege 2944 Ggtlzx.exe Token: SeDebugPrivilege 4524 Wfmzantzeocxy.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msedge.exepid Process 904 msedge.exe 904 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7e997a0cd3967a8010e9fe1d78e29dbcfc4c84abc33537dec2b677d7fad57d7f.exeGgtlzx.exemsedge.exedescription pid Process procid_target PID 3592 wrote to memory of 4524 3592 7e997a0cd3967a8010e9fe1d78e29dbcfc4c84abc33537dec2b677d7fad57d7f.exe 77 PID 3592 wrote to memory of 4524 3592 7e997a0cd3967a8010e9fe1d78e29dbcfc4c84abc33537dec2b677d7fad57d7f.exe 77 PID 3592 wrote to memory of 4524 3592 7e997a0cd3967a8010e9fe1d78e29dbcfc4c84abc33537dec2b677d7fad57d7f.exe 77 PID 3592 wrote to memory of 2944 3592 7e997a0cd3967a8010e9fe1d78e29dbcfc4c84abc33537dec2b677d7fad57d7f.exe 78 PID 3592 wrote to memory of 2944 3592 7e997a0cd3967a8010e9fe1d78e29dbcfc4c84abc33537dec2b677d7fad57d7f.exe 78 PID 2944 wrote to memory of 904 2944 Ggtlzx.exe 79 PID 2944 wrote to memory of 904 2944 Ggtlzx.exe 79 PID 904 wrote to memory of 4000 904 msedge.exe 80 PID 904 wrote to memory of 4000 904 msedge.exe 80 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 3500 904 msedge.exe 81 PID 904 wrote to memory of 4016 904 msedge.exe 82 PID 904 wrote to memory of 4016 904 msedge.exe 82 PID 904 wrote to memory of 3680 904 msedge.exe 83 PID 904 wrote to memory of 3680 904 msedge.exe 83 PID 904 wrote to memory of 3680 904 msedge.exe 83 PID 904 wrote to memory of 3680 904 msedge.exe 83 PID 904 wrote to memory of 3680 904 msedge.exe 83 PID 904 wrote to memory of 3680 904 msedge.exe 83 PID 904 wrote to memory of 3680 904 msedge.exe 83 PID 904 wrote to memory of 3680 904 msedge.exe 83 PID 904 wrote to memory of 3680 904 msedge.exe 83 PID 904 wrote to memory of 3680 904 msedge.exe 83 PID 904 wrote to memory of 3680 904 msedge.exe 83 PID 904 wrote to memory of 3680 904 msedge.exe 83 PID 904 wrote to memory of 3680 904 msedge.exe 83 -
outlook_office_path 1 IoCs
Processes:
Wfmzantzeocxy.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-1082102374-1487407228-1886994731-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Wfmzantzeocxy.exe -
outlook_win_path 1 IoCs
Processes:
Wfmzantzeocxy.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-1082102374-1487407228-1886994731-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Wfmzantzeocxy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e997a0cd3967a8010e9fe1d78e29dbcfc4c84abc33537dec2b677d7fad57d7f.exe"C:\Users\Admin\AppData\Local\Temp\7e997a0cd3967a8010e9fe1d78e29dbcfc4c84abc33537dec2b677d7fad57d7f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\Wfmzantzeocxy.exe"C:\Users\Admin\AppData\Local\Temp\Wfmzantzeocxy.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Accesses Microsoft Outlook profiles
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4524 -s 32523⤵
- Program crash
PID:1596
-
-
-
C:\Users\Admin\AppData\Local\Temp\Ggtlzx.exe"C:\Users\Admin\AppData\Local\Temp\Ggtlzx.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://sellix.io/NYANxCAT/3⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbcf2346f8,0x7ffbcf234708,0x7ffbcf2347184⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,3620567572025472228,7258001882668508797,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:24⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,3620567572025472228,7258001882668508797,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,3620567572025472228,7258001882668508797,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:84⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,3620567572025472228,7258001882668508797,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3840 /prefetch:14⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,3620567572025472228,7258001882668508797,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3884 /prefetch:14⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2148,3620567572025472228,7258001882668508797,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4944 /prefetch:84⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,3620567572025472228,7258001882668508797,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:14⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,3620567572025472228,7258001882668508797,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2960 /prefetch:14⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,3620567572025472228,7258001882668508797,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:14⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,3620567572025472228,7258001882668508797,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:14⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2148,3620567572025472228,7258001882668508797,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5904 /prefetch:84⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,3620567572025472228,7258001882668508797,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6520 /prefetch:84⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings4⤵
- Drops file in Program Files directory
PID:2160 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff631775460,0x7ff631775470,0x7ff6317754805⤵PID:3780
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,3620567572025472228,7258001882668508797,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6520 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2148,3620567572025472228,7258001882668508797,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3240 /prefetch:84⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2148,3620567572025472228,7258001882668508797,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5160 /prefetch:84⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2148,3620567572025472228,7258001882668508797,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7036 /prefetch:84⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,3620567572025472228,7258001882668508797,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1876 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:3036
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4524 -ip 45241⤵PID:4368
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:4696
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
351KB
MD567ce3bcdb0efa71aa51c47f86e165b67
SHA1e709f09587136c0821f46c4b1272dd1b192207d4
SHA2566f7769da2a7dfecfed90a2c5374dda152649d97986cfb4e000a6341f63652dab
SHA512e04a6e1ecdf2d7e7f58dbc1485921b4cbadcd6289b2694a12187b22ac208529e455d87f9d8b41d479def07c299a7186fb3cab3ac5a0dc110194a50a27886aef9
-
Filesize
351KB
MD567ce3bcdb0efa71aa51c47f86e165b67
SHA1e709f09587136c0821f46c4b1272dd1b192207d4
SHA2566f7769da2a7dfecfed90a2c5374dda152649d97986cfb4e000a6341f63652dab
SHA512e04a6e1ecdf2d7e7f58dbc1485921b4cbadcd6289b2694a12187b22ac208529e455d87f9d8b41d479def07c299a7186fb3cab3ac5a0dc110194a50a27886aef9
-
Filesize
2.8MB
MD51dfda4abbd51e74613b3ba1677af903e
SHA1ad38064749d2fe61cd643ae285a3908bf8f9de57
SHA256e5b6669d36d5bc85497f953c51aac4dfe9d7b5ce1dd9b43e6c26d345eba35948
SHA5120498240682315a996aadba546d64a7036d403fd252f041aac287b60b32a747c0093b0ef5e8d30dad3ac89f12d9ce22b71e8ef676afe5be1b315db3ebe0229687
-
Filesize
2.8MB
MD51dfda4abbd51e74613b3ba1677af903e
SHA1ad38064749d2fe61cd643ae285a3908bf8f9de57
SHA256e5b6669d36d5bc85497f953c51aac4dfe9d7b5ce1dd9b43e6c26d345eba35948
SHA5120498240682315a996aadba546d64a7036d403fd252f041aac287b60b32a747c0093b0ef5e8d30dad3ac89f12d9ce22b71e8ef676afe5be1b315db3ebe0229687
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e