Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
19-05-2022 07:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak?hl=de-DE
Resource
win7-20220414-en
General
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\SuggestionsURL = "http://api.bing.com/qsml.aspx?query={searchTerms}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IESS02&market={language}" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\1\SortProp = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\1\ColumnProp\7\Visible = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\1\ColumnProp\41\Width = "80" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Internet Explorer\MAO Settings\Category\2\ColumnProp\32 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\3\ColumnProp\28\Visible = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\UpgradeTime = f982cdb29d50d801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\1\ColumnProp\25\Visible = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\User Preferences\2BB20B33B4171CDAAB6469225AE6A582ED33D7B488 = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009ca67aad6973c147a14e4257979b091500000000020000000000106600000001000020000000b668b4f89a38e35e5e98865d3307fc15449f65aa1d10b29bfd69fa689ec7d620000000000e80000000020000200000001a22d6ce5dbc3131c2cbc49a74988337c3ec3deb15a04038cc5aa064fe409023100000009b21f981bdb906467429bfe85a6a3db54000000084125fddf6b3b838474561ebce3775ef83bbfd66ddc1f1f308486c875d38566837789df9dd30acf93c37903afb2c1d10d47f62ac6b9b6461db017ef9cc46b758 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\1\ColumnProp\27 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\1\ColumnProp\8\Width = "120" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\1\ColumnProp\36\Width = "80" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Internet Explorer\User Preferences iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\NTTopResultURL = "http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IENTTR" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\1\ColumnProp\16 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\1\ColumnProp\1\Visible = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\1\ColumnProp\8\Visible = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\2\ColumnProp\31\Visible = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\5\SortAscending = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconURLFallback = "http://www.bing.com/favicon.ico" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\1\ColumnProp\8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\1\ColumnProp\14 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\2\ColumnProp\5\Width = "120" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\5\ColumnProp\31\Visible = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\SuggestionsURLFallback = "http://api.bing.com/qsml.aspx?query={searchTerms}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IESS02&market={language}" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\1\ColumnProp iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\1\ColumnProp\20\Width = "120" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\1\ColumnProp\6 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\2\ColumnProp\12\Width = "200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\3\ColumnProp\12\Visible = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\3\ColumnProp\28\Width = "200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Internet Explorer\MAO Settings\Category\2\ColumnProp\27 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\5\ColumnProp\27 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\5\ColumnProp\31\Width = "200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\1\ColumnProp\28 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\1\ColumnProp\6\Visible = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\1\ColumnProp\14\Width = "80" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\1\ColumnProp\41\Visible = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Internet Explorer\MAO Settings\Category\2\ColumnProp\12 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\2\ColumnProp\22\Visible = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\3\ColumnProp\25\Visible = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "4270904536" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\1\ColumnProp\45\Visible = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\1\ColumnProp\34\Width = "80" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\1\ColumnProp\42\Width = "80" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\2\ColumnProp iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\NTLogoURL = "http://go.microsoft.com/fwlink/?LinkID=403856&language={language}&scale={scalelevel}&contrast={contrast}" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30960480" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Internet Explorer\MAO Settings\Category\2\ColumnProp\31 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30960480" IEXPLORE.EXE -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
msedge.exemsedge.exepid process 660 msedge.exe 660 msedge.exe 1416 msedge.exe 1416 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 2360 iexplore.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
msedge.exepid process 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
iexplore.exemsedge.exepid process 2360 iexplore.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2360 iexplore.exe 2360 iexplore.exe 4372 IEXPLORE.EXE 4372 IEXPLORE.EXE 4372 IEXPLORE.EXE 4372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
iexplore.exemsedge.exedescription pid process target process PID 2360 wrote to memory of 4372 2360 iexplore.exe IEXPLORE.EXE PID 2360 wrote to memory of 4372 2360 iexplore.exe IEXPLORE.EXE PID 2360 wrote to memory of 4372 2360 iexplore.exe IEXPLORE.EXE PID 2360 wrote to memory of 1416 2360 iexplore.exe msedge.exe PID 2360 wrote to memory of 1416 2360 iexplore.exe msedge.exe PID 1416 wrote to memory of 924 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 924 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1296 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 660 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 660 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1532 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1532 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1532 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1532 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1532 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1532 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1532 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1532 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1532 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1532 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1532 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1532 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1532 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1532 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 1532 1416 msedge.exe msedge.exe
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak?hl=de-DE1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://go.microsoft.com/fwlink/?LinkId=2115922⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0x80,0x104,0x7ff97d2246f8,0x7ff97d224708,0x7ff97d2247183⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,7806481947353909050,9690390441572877124,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:23⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,7806481947353909050,9690390441572877124,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2428 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,7806481947353909050,9690390441572877124,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7806481947353909050,9690390441572877124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3840 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7806481947353909050,9690390441572877124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3864 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2096,7806481947353909050,9690390441572877124,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5236 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7806481947353909050,9690390441572877124,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2096,7806481947353909050,9690390441572877124,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5888 /prefetch:83⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63Filesize
1KB
MD560b3ecc11d722d74de4c9a3df9d556b4
SHA17c06f819e90a777bd7969c534ff2e796b07f1bfd
SHA25630f4bee4ab4756c731ea2df39a68452ae05b280c16e2bf8d4dba5b575a223003
SHA512783868202eca1d3d69ddf2bff5ee8fd1118d9ef3bc2b99d83bc567f2051c5a47e8f19e31f2ef81fa6f691bfdffde6d0ae98d67d97d22c97295f1e302005fdb3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
471B
MD50139ae54ab5bd17af42facbbdf2b01d0
SHA1aa0b305fad4211f81edfa2521bece92e758b4376
SHA25693c8a57c9a7a70617fd4e7f17442b9fa24e31104000de22637123111dcb5c305
SHA512f34ab12338eb3fd16bc26f24b20b349a14f6fa29f4dfdb91d026347222a66abc538e6753961fbc0484efeefc56abdf6edd00ec7a80b0b8a9270d747988e5741c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_D975BBA8033175C8D112023D8A7A8AD6Filesize
471B
MD5ea6765acc46420ba4dbe60013afb7f2b
SHA1cfea4494991f729ecbd10cddbb4ec3796fd31c0c
SHA256c6e1a89a9a379b1ba9850fb1c32d702531e3a9dea6f0fb34cca7fded9f991fe7
SHA5126b736759fc94e81010d85784309996f290a5d4565029c3c855d2c74da266b98a4ce5f36826e6c6b7270578967a79e4fe131249d3f05aa883b442f25b81bff8ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C0427F5F77D9B3A439FC620EDAAB6177Filesize
471B
MD5c5cbae7ff3c87c7f1faf7f7f52dc20b0
SHA1d86b047cb903d7f13a411ac76a9d982aa4777db0
SHA25607393f440ef69782adb4bf97f1f2546ed16b227aefe338b11f79b2aa91f42967
SHA51246ab522b6d639eb1cca0dca5a5f9bc88cd86ee60a9e68206fc15577eae7dd1fd2b56b6497805da59bd0d7af86e2fa7d62c141712ee5b4b4864a07d6a13196658
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868Filesize
471B
MD581cd3fd39122700c1177eeddf5ab254b
SHA1f52b2235c48f8242374446c9bf1946b8557cd43e
SHA2569ac3e6847665c1d7e2d701c00c55a3eca3a674ad06a27558a83edcffc95ff1a9
SHA512435fb204d865f48b373ad68caabd6e0baf7f0859b2676e69cf10ff449a724f3ba52702107dcdfbfc83d7c43e49e64ff752a30ab65a6112073efa54c94078e47f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63Filesize
404B
MD51487640bd290542fefbd47c4e1de4ecd
SHA1ef95a8bfb67a9f6863b8ae83abedadcbc13eb214
SHA256b61750ccfe56e4e869c346a364f96364b7a99f159dbcc6699fb1f4a8a1e6d4d8
SHA512e03cdfc5169851e37699a33f85d622bd58ae14cd134c079e7c7d3f1bf0e7e610a6e7c8fc78ba8a73f4d3cb5b09f8e802215688af96c8f145fcf8e3bf7610ea48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
434B
MD5eded43fddecf0432fb44aebe24493c50
SHA13988937ab87f81b6d60d96c044e8a72153a117cf
SHA256da2c700565565d72f03cf19532f829b36b6e18bf45dae1992fda7bf46064c872
SHA512e2c0b34c1f7b0a54211e87281696cf6f9e8d97d17fbc695a430b7e2b13a740983609ea474d483a867c342bec361cc8a06a9a16b25864fd1f2140176e1a7fe4ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_D975BBA8033175C8D112023D8A7A8AD6Filesize
434B
MD5c24a124d2db7a399501283926c19d58c
SHA1c9d10bb22cf6c5a81b012beb384210b4d13d0969
SHA2561421cf0a7081510c2d108c9d8b6994619e3b210c7cbb212dbb0156a7ff6195a6
SHA512d80b160cb2ae55baeb1a993320512c82842ef1f5a19b65a11c7a3fda9c6cbf109c881c3517167744c9d70c7de0d10daa42c2f574beeaf443fdb94b5088a7b764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C0427F5F77D9B3A439FC620EDAAB6177Filesize
442B
MD5fb86539ddba217b4be613ed7aceeffab
SHA196a7f0fd690a0cd4a43e9a44782619653b84e486
SHA25648d8a7ac68c8dac1ff7d71893a6287bb1c4b413b06623b1d4eb71d1aa929bb7a
SHA5124483148d01451191969da9fa347e182d2460cfa975189f0b6f71c08c80d17ab9fe846153884a58e0737070d6e72e0d1e867f012d8f1f8b61ca7dc02638c18fb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868Filesize
442B
MD56717f7ce916d51463031f0cd9a312c53
SHA12fb5516a322dc41a8860f25610d9abefb08051a4
SHA256f9fba1a65c73707f2bdc401981f71071db83d90e6a4789af2715e1b5da00e521
SHA5125a6c2249ab6f1e3faefe6fc7eb6aa6fe84f9893278676d01ef8574e6ba598e4872e69d239e4052822ad4105c862b76e070388e08e2afbd5ffb6b42a9286425cb
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\2klo80q\imagestore.datFilesize
1KB
MD540c9924ca55b1062fabf4e6d53aca1e0
SHA12c0411d2100360ed47500b048a02e2739dc50045
SHA25663cf5b6426318a8e7270bb10ffba75d287b5094cf43d55c688cb5e3562ed2362
SHA512e736058a5cb844f0f47803893cd1167eafe87d6b444cce366487262c0ee5ec8adb3a92699312c56e976ab559e06f3d32f3d65ee63b1ef976e973308525da1622
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\T4LT4978\favicon[1].icoFilesize
1KB
MD5c31f21550fe41b47cc0775fefd023205
SHA1239a8cef4a782fa47f4b733f715747a7a0174327
SHA25654d502bf879cb1e12d4a7122d2dc71633ac2afd930a9f3748135a88b4641cc9e
SHA51269d10d7515c399814c734bd3cc51a717e3f9d458a64b3ed6c807c8baa37920d37a1c9704f58bf759bb50e145bcc82614c1b46c3c2aad3ad270784f3b44643d30
-
\??\pipe\LOCAL\crashpad_1416_EGRWVHBSZAZVOUYJMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/528-159-0x0000000000000000-mapping.dmp
-
memory/660-140-0x0000000000000000-mapping.dmp
-
memory/924-137-0x0000000000000000-mapping.dmp
-
memory/1296-139-0x0000000000000000-mapping.dmp
-
memory/1416-136-0x0000000000000000-mapping.dmp
-
memory/1532-143-0x0000000000000000-mapping.dmp
-
memory/2280-157-0x0000000000000000-mapping.dmp
-
memory/3144-151-0x0000000000000000-mapping.dmp
-
memory/3188-149-0x0000000000000000-mapping.dmp
-
memory/5096-147-0x0000000000000000-mapping.dmp