Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2022, 18:34
Static task
static1
Behavioral task
behavioral1
Sample
c625a4b7-29ac-449e-a26c-3c23e734b6f0.html
Resource
win10v2004-20220901-en
General
-
Target
c625a4b7-29ac-449e-a26c-3c23e734b6f0.html
-
Size
902KB
-
MD5
ccac45f1b5f6ed78c79e9664cf94061c
-
SHA1
4002f24d14241e295e60eb84e9fb1c8f44d2e1e7
-
SHA256
6b5cbe2f06bd326c2dd884c2852771d1a4a37e8a5e915301ff06e37b0fed8f02
-
SHA512
b8b38413c400b02dd739dfd3871d8ea92ecbf7e9dfdbd9e56fc1d09262fa1b08017d3d8a4722e10166b549e80a74d5fc9a748dfd068bac93fb1927b58f5048c6
-
SSDEEP
12288:wv7zjoA2MUv/EAAs0W6D3LjpDepyVYDUNPKfTMNVU37CCJE6sq26:ez0/BHFAsS/ZebUlKfT0oWp6
Malware Config
Extracted
qakbot
156.36.22.250:12263
73.225.210.175:40922
19.138.81.187:38748
191.101.43.136:10968
145.20.244.169:39814
74.30.254.35:15530
138.94.26.23:49965
218.175.98.133:15428
181.245.40.43:1982
24.10.174.212:30807
253.219.195.173:1546
51.182.7.163:21304
191.68.117.56:28754
246.29.132.217:16625
149.181.112.217:33637
136.20.21.112:41199
80.65.15.199:35765
0.222.227.111:63041
209.240.1.52:53226
66.57.60.202:19263
204.187.37.185:59783
177.172.2.9:36791
98.78.50.99:11939
11.5.197.37:32044
75.234.214.212:7741
49.66.110.196:42474
97.107.137.246:58239
0.141.208.192:39992
185.156.9.78:29812
219.151.188.60:3622
28.86.80.9:6038
138.226.185.49:25801
99.128.65.72:12277
90.175.231.93:54035
198.125.102.127:36652
148.215.17.55:16834
211.255.222.125:38939
198.140.91.23:0
15.114.17.14:1442
56.9.100.20:53368
88.117.146.12:40265
200.215.143.195:52771
134.133.152.217:5132
227.189.195.57:42370
76.219.151.168:17454
17.1.24.235:65225
217.27.142.33:46036
13.16.220.0:0
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Enumerates connected drives 3 TTPs 3 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: cmd.exe File opened (read-only) \??\E: WScript.exe File opened (read-only) \??\E: cmd.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\146f0f4e-f389-4a6b-bba1-8b366f0088ff.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221008183516.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000003\Service msedge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000003 msedge.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000003\HardwareID msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings powershell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3340 powershell.exe 3340 powershell.exe 3512 msedge.exe 3512 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4136 msedge.exe 4136 msedge.exe 3532 identity_helper.exe 3532 identity_helper.exe 3832 regsvr32.exe 3832 regsvr32.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe 4304 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3832 regsvr32.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3340 powershell.exe -
Suspicious use of FindShellTrayWindow 11 IoCs
pid Process 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4296 wrote to memory of 4328 4296 msedge.exe 85 PID 4296 wrote to memory of 4328 4296 msedge.exe 85 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 2364 4296 msedge.exe 89 PID 4296 wrote to memory of 3512 4296 msedge.exe 90 PID 4296 wrote to memory of 3512 4296 msedge.exe 90 PID 4296 wrote to memory of 2932 4296 msedge.exe 92 PID 4296 wrote to memory of 2932 4296 msedge.exe 92 PID 4296 wrote to memory of 2932 4296 msedge.exe 92 PID 4296 wrote to memory of 2932 4296 msedge.exe 92 PID 4296 wrote to memory of 2932 4296 msedge.exe 92 PID 4296 wrote to memory of 2932 4296 msedge.exe 92 PID 4296 wrote to memory of 2932 4296 msedge.exe 92 PID 4296 wrote to memory of 2932 4296 msedge.exe 92 PID 4296 wrote to memory of 2932 4296 msedge.exe 92 PID 4296 wrote to memory of 2932 4296 msedge.exe 92 PID 4296 wrote to memory of 2932 4296 msedge.exe 92 PID 4296 wrote to memory of 2932 4296 msedge.exe 92 PID 4296 wrote to memory of 2932 4296 msedge.exe 92 PID 4296 wrote to memory of 2932 4296 msedge.exe 92 PID 4296 wrote to memory of 2932 4296 msedge.exe 92 PID 4296 wrote to memory of 2932 4296 msedge.exe 92 PID 4296 wrote to memory of 2932 4296 msedge.exe 92 PID 4296 wrote to memory of 2932 4296 msedge.exe 92 PID 4296 wrote to memory of 2932 4296 msedge.exe 92 PID 4296 wrote to memory of 2932 4296 msedge.exe 92
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell start shell:Appsfolder\Microsoft.MicrosoftEdge_8wekyb3d8bbwe!MicrosoftEdge C:\Users\Admin\AppData\Local\Temp\c625a4b7-29ac-449e-a26c-3c23e734b6f0.html1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3340
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --edge-redirect=Windows.Launch C:\Users\Admin\AppData\Local\Temp\c625a4b7-29ac-449e-a26c-3c23e734b6f0.html1⤵
- Adds Run key to start application
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffdae2a46f8,0x7ffdae2a4708,0x7ffdae2a47182⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,8802407666537227632,6211412789541933808,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,8802407666537227632,6211412789541933808,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,8802407666537227632,6211412789541933808,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3056 /prefetch:82⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8802407666537227632,6211412789541933808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3748 /prefetch:12⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8802407666537227632,6211412789541933808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3760 /prefetch:12⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2128,8802407666537227632,6211412789541933808,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5288 /prefetch:82⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8802407666537227632,6211412789541933808,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2128,8802407666537227632,6211412789541933808,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4408 /prefetch:82⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8802407666537227632,6211412789541933808,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2128,8802407666537227632,6211412789541933808,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2128,8802407666537227632,6211412789541933808,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6012 /prefetch:82⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8802407666537227632,6211412789541933808,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6164 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8802407666537227632,6211412789541933808,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6204 /prefetch:12⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,8802407666537227632,6211412789541933808,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6536 /prefetch:82⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings2⤵
- Drops file in Program Files directory
PID:4892 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff6f3a45460,0x7ff6f3a45470,0x7ff6f3a454803⤵PID:932
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,8802407666537227632,6211412789541933808,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6536 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2128,8802407666537227632,6211412789541933808,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=2064 /prefetch:82⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2128,8802407666537227632,6211412789541933808,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2544 /prefetch:82⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2128,8802407666537227632,6211412789541933808,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1192 /prefetch:82⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2128,8802407666537227632,6211412789541933808,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5320 /prefetch:82⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2128,8802407666537227632,6211412789541933808,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4228 /prefetch:82⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,8802407666537227632,6211412789541933808,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=900 /prefetch:22⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2128,8802407666537227632,6211412789541933808,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5400 /prefetch:82⤵PID:788
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2212
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4468
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c %cd%\7965\6928.js1⤵
- Checks computer location settings
- Enumerates connected drives
- Modifies registry class
PID:3340 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "E:\7965\6928.js"2⤵
- Checks computer location settings
- Enumerates connected drives
PID:4144 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""E:\7965\1375.cmd" reg sv"3⤵
- Enumerates connected drives
PID:4784 -
C:\Windows\system32\regsvr32.exeregsvr32 7965\predominantly.dat4⤵PID:2256
-
C:\Windows\SysWOW64\regsvr32.exe7965\predominantly.dat5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3832 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe6⤵
- Suspicious behavior: EnumeratesProcesses
PID:4304
-
-
-
-
-