Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2022, 01:55
Static task
static1
Behavioral task
behavioral1
Sample
a2038d43a23790d02d8beadaaafdda5341887c751a68a2d50e7df0b7d9af9698.exe
Resource
win10v2004-20220812-en
General
-
Target
a2038d43a23790d02d8beadaaafdda5341887c751a68a2d50e7df0b7d9af9698.exe
-
Size
1.2MB
-
MD5
7503b84ca25b6d0b9d92b56b10edc8ed
-
SHA1
b18ca8a85d95255ba907ddf6a54ef64048df0cb5
-
SHA256
a2038d43a23790d02d8beadaaafdda5341887c751a68a2d50e7df0b7d9af9698
-
SHA512
6b2e0e9f8a7ac425c191074295eb62f170633f3863a04b454a1ae39b78768b1cf6364c897d380f5f3c48eff7d24c0783db95aec4723764625b2f850419b7a8cb
-
SSDEEP
24576:cU4cIkGNY8okBjGsMJij/+NWNyQXFagX/t179:zVIk+Y8PG6i1Q1aU1
Malware Config
Extracted
remcos
PeterObi2023
76.8.53.133:1198
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
sdfge.exe
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
fghoiuytr.dat
-
keylog_flag
false
-
mouse_option
false
-
mutex
fghjcvbn-UURPOS
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
dfghrtyu
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1920 sdfge.exe 2436 sdfge.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation a2038d43a23790d02d8beadaaafdda5341887c751a68a2d50e7df0b7d9af9698.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation WScript.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ a2038d43a23790d02d8beadaaafdda5341887c751a68a2d50e7df0b7d9af9698.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dfghrtyu = "\"C:\\Users\\Admin\\AppData\\Roaming\\sdfge.exe\"" a2038d43a23790d02d8beadaaafdda5341887c751a68a2d50e7df0b7d9af9698.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ sdfge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dfghrtyu = "\"C:\\Users\\Admin\\AppData\\Roaming\\sdfge.exe\"" sdfge.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 3428 set thread context of 2336 3428 a2038d43a23790d02d8beadaaafdda5341887c751a68a2d50e7df0b7d9af9698.exe 93 PID 1920 set thread context of 2436 1920 sdfge.exe 107 PID 2436 set thread context of 1536 2436 sdfge.exe 108 PID 2436 set thread context of 4708 2436 sdfge.exe 118 PID 2436 set thread context of 5016 2436 sdfge.exe 142 PID 2436 set thread context of 3652 2436 sdfge.exe 151 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\7cc4151a-af40-40be-bb2f-5ef5180074b9.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20220909035741.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings a2038d43a23790d02d8beadaaafdda5341887c751a68a2d50e7df0b7d9af9698.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3984 msedge.exe 3984 msedge.exe 1964 msedge.exe 1964 msedge.exe 3472 identity_helper.exe 3472 identity_helper.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 2436 sdfge.exe 2436 sdfge.exe 2436 sdfge.exe 2436 sdfge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1964 msedge.exe 1964 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2436 sdfge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3428 wrote to memory of 2336 3428 a2038d43a23790d02d8beadaaafdda5341887c751a68a2d50e7df0b7d9af9698.exe 93 PID 3428 wrote to memory of 2336 3428 a2038d43a23790d02d8beadaaafdda5341887c751a68a2d50e7df0b7d9af9698.exe 93 PID 3428 wrote to memory of 2336 3428 a2038d43a23790d02d8beadaaafdda5341887c751a68a2d50e7df0b7d9af9698.exe 93 PID 3428 wrote to memory of 2336 3428 a2038d43a23790d02d8beadaaafdda5341887c751a68a2d50e7df0b7d9af9698.exe 93 PID 3428 wrote to memory of 2336 3428 a2038d43a23790d02d8beadaaafdda5341887c751a68a2d50e7df0b7d9af9698.exe 93 PID 3428 wrote to memory of 2336 3428 a2038d43a23790d02d8beadaaafdda5341887c751a68a2d50e7df0b7d9af9698.exe 93 PID 3428 wrote to memory of 2336 3428 a2038d43a23790d02d8beadaaafdda5341887c751a68a2d50e7df0b7d9af9698.exe 93 PID 3428 wrote to memory of 2336 3428 a2038d43a23790d02d8beadaaafdda5341887c751a68a2d50e7df0b7d9af9698.exe 93 PID 3428 wrote to memory of 2336 3428 a2038d43a23790d02d8beadaaafdda5341887c751a68a2d50e7df0b7d9af9698.exe 93 PID 3428 wrote to memory of 2336 3428 a2038d43a23790d02d8beadaaafdda5341887c751a68a2d50e7df0b7d9af9698.exe 93 PID 3428 wrote to memory of 2336 3428 a2038d43a23790d02d8beadaaafdda5341887c751a68a2d50e7df0b7d9af9698.exe 93 PID 3428 wrote to memory of 2336 3428 a2038d43a23790d02d8beadaaafdda5341887c751a68a2d50e7df0b7d9af9698.exe 93 PID 2336 wrote to memory of 1600 2336 a2038d43a23790d02d8beadaaafdda5341887c751a68a2d50e7df0b7d9af9698.exe 94 PID 2336 wrote to memory of 1600 2336 a2038d43a23790d02d8beadaaafdda5341887c751a68a2d50e7df0b7d9af9698.exe 94 PID 2336 wrote to memory of 1600 2336 a2038d43a23790d02d8beadaaafdda5341887c751a68a2d50e7df0b7d9af9698.exe 94 PID 1600 wrote to memory of 1972 1600 WScript.exe 95 PID 1600 wrote to memory of 1972 1600 WScript.exe 95 PID 1600 wrote to memory of 1972 1600 WScript.exe 95 PID 1972 wrote to memory of 1920 1972 cmd.exe 97 PID 1972 wrote to memory of 1920 1972 cmd.exe 97 PID 1972 wrote to memory of 1920 1972 cmd.exe 97 PID 1920 wrote to memory of 2436 1920 sdfge.exe 107 PID 1920 wrote to memory of 2436 1920 sdfge.exe 107 PID 1920 wrote to memory of 2436 1920 sdfge.exe 107 PID 1920 wrote to memory of 2436 1920 sdfge.exe 107 PID 1920 wrote to memory of 2436 1920 sdfge.exe 107 PID 1920 wrote to memory of 2436 1920 sdfge.exe 107 PID 1920 wrote to memory of 2436 1920 sdfge.exe 107 PID 1920 wrote to memory of 2436 1920 sdfge.exe 107 PID 1920 wrote to memory of 2436 1920 sdfge.exe 107 PID 1920 wrote to memory of 2436 1920 sdfge.exe 107 PID 1920 wrote to memory of 2436 1920 sdfge.exe 107 PID 1920 wrote to memory of 2436 1920 sdfge.exe 107 PID 2436 wrote to memory of 1536 2436 sdfge.exe 108 PID 2436 wrote to memory of 1536 2436 sdfge.exe 108 PID 2436 wrote to memory of 1536 2436 sdfge.exe 108 PID 2436 wrote to memory of 1536 2436 sdfge.exe 108 PID 1536 wrote to memory of 1964 1536 svchost.exe 110 PID 1536 wrote to memory of 1964 1536 svchost.exe 110 PID 1964 wrote to memory of 3120 1964 msedge.exe 111 PID 1964 wrote to memory of 3120 1964 msedge.exe 111 PID 1964 wrote to memory of 2832 1964 msedge.exe 112 PID 1964 wrote to memory of 2832 1964 msedge.exe 112 PID 1964 wrote to memory of 2832 1964 msedge.exe 112 PID 1964 wrote to memory of 2832 1964 msedge.exe 112 PID 1964 wrote to memory of 2832 1964 msedge.exe 112 PID 1964 wrote to memory of 2832 1964 msedge.exe 112 PID 1964 wrote to memory of 2832 1964 msedge.exe 112 PID 1964 wrote to memory of 2832 1964 msedge.exe 112 PID 1964 wrote to memory of 2832 1964 msedge.exe 112 PID 1964 wrote to memory of 2832 1964 msedge.exe 112 PID 1964 wrote to memory of 2832 1964 msedge.exe 112 PID 1964 wrote to memory of 2832 1964 msedge.exe 112 PID 1964 wrote to memory of 2832 1964 msedge.exe 112 PID 1964 wrote to memory of 2832 1964 msedge.exe 112 PID 1964 wrote to memory of 2832 1964 msedge.exe 112 PID 1964 wrote to memory of 2832 1964 msedge.exe 112 PID 1964 wrote to memory of 2832 1964 msedge.exe 112 PID 1964 wrote to memory of 2832 1964 msedge.exe 112 PID 1964 wrote to memory of 2832 1964 msedge.exe 112 PID 1964 wrote to memory of 2832 1964 msedge.exe 112 PID 1964 wrote to memory of 2832 1964 msedge.exe 112 PID 1964 wrote to memory of 2832 1964 msedge.exe 112 PID 1964 wrote to memory of 2832 1964 msedge.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2038d43a23790d02d8beadaaafdda5341887c751a68a2d50e7df0b7d9af9698.exe"C:\Users\Admin\AppData\Local\Temp\a2038d43a23790d02d8beadaaafdda5341887c751a68a2d50e7df0b7d9af9698.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\a2038d43a23790d02d8beadaaafdda5341887c751a68a2d50e7df0b7d9af9698.exe"C:\Users\Admin\AppData\Local\Temp\a2038d43a23790d02d8beadaaafdda5341887c751a68a2d50e7df0b7d9af9698.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\sdfge.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Roaming\sdfge.exeC:\Users\Admin\AppData\Roaming\sdfge.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Roaming\sdfge.exe"C:\Users\Admin\AppData\Roaming\sdfge.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\svchost.exesvchost.exe7⤵
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.08⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa326946f8,0x7ffa32694708,0x7ffa326947189⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,16923988013684836240,11619082227288341757,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:29⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,16923988013684836240,11619082227288341757,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2668 /prefetch:39⤵
- Suspicious behavior: EnumeratesProcesses
PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,16923988013684836240,11619082227288341757,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3152 /prefetch:89⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16923988013684836240,11619082227288341757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3756 /prefetch:19⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16923988013684836240,11619082227288341757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3784 /prefetch:19⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16923988013684836240,11619082227288341757,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4500 /prefetch:19⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2136,16923988013684836240,11619082227288341757,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5160 /prefetch:89⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16923988013684836240,11619082227288341757,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:19⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16923988013684836240,11619082227288341757,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:19⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2136,16923988013684836240,11619082227288341757,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5892 /prefetch:89⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16923988013684836240,11619082227288341757,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:19⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16923988013684836240,11619082227288341757,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5976 /prefetch:19⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16923988013684836240,11619082227288341757,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:19⤵PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16923988013684836240,11619082227288341757,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6240 /prefetch:19⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,16923988013684836240,11619082227288341757,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6412 /prefetch:89⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings9⤵
- Drops file in Program Files directory
PID:1372 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff67cab5460,0x7ff67cab5470,0x7ff67cab548010⤵PID:3312
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,16923988013684836240,11619082227288341757,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6412 /prefetch:89⤵
- Suspicious behavior: EnumeratesProcesses
PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16923988013684836240,11619082227288341757,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:19⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16923988013684836240,11619082227288341757,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6624 /prefetch:19⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16923988013684836240,11619082227288341757,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:19⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16923988013684836240,11619082227288341757,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6764 /prefetch:19⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16923988013684836240,11619082227288341757,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:19⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16923988013684836240,11619082227288341757,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6904 /prefetch:19⤵PID:4944
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.08⤵PID:3804
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa326946f8,0x7ffa32694708,0x7ffa326947189⤵PID:3776
-
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe7⤵PID:4708
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.08⤵PID:2068
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xc4,0x108,0x7ffa326946f8,0x7ffa32694708,0x7ffa326947189⤵PID:4728
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.08⤵PID:2020
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa326946f8,0x7ffa32694708,0x7ffa326947189⤵PID:2932
-
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe7⤵PID:5016
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.08⤵PID:1328
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa326946f8,0x7ffa32694708,0x7ffa326947189⤵PID:4324
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.08⤵PID:1048
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe8,0x108,0x7ffa326946f8,0x7ffa32694708,0x7ffa326947189⤵PID:3468
-
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe7⤵PID:3652
-
-
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1520
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57b3f352bbc8046d1d5d84c5bb693e2e5
SHA1e9d1ec6341b7959453e7cfb1ec65a55bf415cd4c
SHA256471da5f4a494fb6adb027e3fd80765a6c27a3967208aad8fb55e38a3f7fca7da
SHA512c984248535cb94fc265e93b9001d5936697dd2ff3ef8dfedd014df64b5f76e031eea1a594db3085e0149794ad90802a45c6cd985035ba383d1bf80ed928ff809
-
Filesize
152B
MD57b3f352bbc8046d1d5d84c5bb693e2e5
SHA1e9d1ec6341b7959453e7cfb1ec65a55bf415cd4c
SHA256471da5f4a494fb6adb027e3fd80765a6c27a3967208aad8fb55e38a3f7fca7da
SHA512c984248535cb94fc265e93b9001d5936697dd2ff3ef8dfedd014df64b5f76e031eea1a594db3085e0149794ad90802a45c6cd985035ba383d1bf80ed928ff809
-
Filesize
152B
MD5962644599f0c746e1b17a064c670d314
SHA173ccfa471325f9fe38767edab76fa81e95565eed
SHA25612a158f591771e7f38f053f1313393c645faa7f295dc9f6585ebca642b9e1966
SHA512cd0cbce39701693991473c1d6b8fbbe63123cbad26f5f745fcc2e0eab2db17926a577b0bc72b7d84a9cbc976112a054a5f071c5fafd6e38c32facba28d79c4cb
-
Filesize
152B
MD5962644599f0c746e1b17a064c670d314
SHA173ccfa471325f9fe38767edab76fa81e95565eed
SHA25612a158f591771e7f38f053f1313393c645faa7f295dc9f6585ebca642b9e1966
SHA512cd0cbce39701693991473c1d6b8fbbe63123cbad26f5f745fcc2e0eab2db17926a577b0bc72b7d84a9cbc976112a054a5f071c5fafd6e38c32facba28d79c4cb
-
Filesize
152B
MD5962644599f0c746e1b17a064c670d314
SHA173ccfa471325f9fe38767edab76fa81e95565eed
SHA25612a158f591771e7f38f053f1313393c645faa7f295dc9f6585ebca642b9e1966
SHA512cd0cbce39701693991473c1d6b8fbbe63123cbad26f5f745fcc2e0eab2db17926a577b0bc72b7d84a9cbc976112a054a5f071c5fafd6e38c32facba28d79c4cb
-
Filesize
152B
MD5962644599f0c746e1b17a064c670d314
SHA173ccfa471325f9fe38767edab76fa81e95565eed
SHA25612a158f591771e7f38f053f1313393c645faa7f295dc9f6585ebca642b9e1966
SHA512cd0cbce39701693991473c1d6b8fbbe63123cbad26f5f745fcc2e0eab2db17926a577b0bc72b7d84a9cbc976112a054a5f071c5fafd6e38c32facba28d79c4cb
-
Filesize
402B
MD598acdc6ea897431e57cab98ee8203874
SHA11858e36b790f415f850063b1aa291846a1b4b4b1
SHA256e55d508c8f0fbfbb78d556fbd969e1611b95872b8f73f046e7c71c5c2804a50a
SHA512ac41f7acb3be653f398066d353120935cc3764fdddb9346fddc6012f1d0e61a3a09a7a434806cab3654c37a1301d637081d921a634b1919b72d4e07e66b38aa7
-
Filesize
1.2MB
MD57503b84ca25b6d0b9d92b56b10edc8ed
SHA1b18ca8a85d95255ba907ddf6a54ef64048df0cb5
SHA256a2038d43a23790d02d8beadaaafdda5341887c751a68a2d50e7df0b7d9af9698
SHA5126b2e0e9f8a7ac425c191074295eb62f170633f3863a04b454a1ae39b78768b1cf6364c897d380f5f3c48eff7d24c0783db95aec4723764625b2f850419b7a8cb
-
Filesize
1.2MB
MD57503b84ca25b6d0b9d92b56b10edc8ed
SHA1b18ca8a85d95255ba907ddf6a54ef64048df0cb5
SHA256a2038d43a23790d02d8beadaaafdda5341887c751a68a2d50e7df0b7d9af9698
SHA5126b2e0e9f8a7ac425c191074295eb62f170633f3863a04b454a1ae39b78768b1cf6364c897d380f5f3c48eff7d24c0783db95aec4723764625b2f850419b7a8cb
-
Filesize
1.2MB
MD57503b84ca25b6d0b9d92b56b10edc8ed
SHA1b18ca8a85d95255ba907ddf6a54ef64048df0cb5
SHA256a2038d43a23790d02d8beadaaafdda5341887c751a68a2d50e7df0b7d9af9698
SHA5126b2e0e9f8a7ac425c191074295eb62f170633f3863a04b454a1ae39b78768b1cf6364c897d380f5f3c48eff7d24c0783db95aec4723764625b2f850419b7a8cb