Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
adaec2245a4b01d2ff9f68260ed9a3ce9ce6754b22a0032d3812e00472a925bb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
adaec2245a4b01d2ff9f68260ed9a3ce9ce6754b22a0032d3812e00472a925bb.exe
Resource
win10v2004-20220901-en
General
-
Target
adaec2245a4b01d2ff9f68260ed9a3ce9ce6754b22a0032d3812e00472a925bb.exe
-
Size
76KB
-
MD5
7ba912af2aef3afb969f67f5afc9a6d0
-
SHA1
522af879ba9b007f48d69ef6888739022addab84
-
SHA256
adaec2245a4b01d2ff9f68260ed9a3ce9ce6754b22a0032d3812e00472a925bb
-
SHA512
b3f1f6d0576bbbe4da78e13c99d452ef6cbb4b9912123e11cf430678bc35f3a61d2b7471f30b44f1c6e36f3cfb553fd90bca958e6d570dd89a877dcbff30a706
-
SSDEEP
768:jxDI8Nwl34ETcpcbCgHjSJ070vvLXmJuBGNgj5mMjI1t0cT4qf7hOZR6f6Y:jxDXwTQcbCg29nLXcu8h7hOZRhY
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation adaec2245a4b01d2ff9f68260ed9a3ce9ce6754b22a0032d3812e00472a925bb.exe -
Loads dropped DLL 1 IoCs
pid Process 1564 regsvr32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{A83359CE-23D4-4E1A-9D4E-C94AEDD1A67C} regsvr32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\haxo.dll adaec2245a4b01d2ff9f68260ed9a3ce9ce6754b22a0032d3812e00472a925bb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 61 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C1D4354E-C81A-4C16-9C41-D6FB49AA31A8}\ = "_IBhoEvents" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BhoNew.Bho\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A83359CE-23D4-4E1A-9D4E-C94AEDD1A67C}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{049652C3-55AE-4A6E-84CE-0C5B733E8F82}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{049652C3-55AE-4A6E-84CE-0C5B733E8F82}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Gorpy\ = "IE Story" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A83359CE-23D4-4E1A-9D4E-C94AEDD1A67C}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A83359CE-23D4-4E1A-9D4E-C94AEDD1A67C}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A83359CE-23D4-4E1A-9D4E-C94AEDD1A67C}\InprocServer32\ = "C:\\Windows\\SysWow64\\haxo.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\haxo.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Gorpy regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C1D4354E-C81A-4C16-9C41-D6FB49AA31A8} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C1D4354E-C81A-4C16-9C41-D6FB49AA31A8}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C1D4354E-C81A-4C16-9C41-D6FB49AA31A8}\TypeLib\ = "{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{049652C3-55AE-4A6E-84CE-0C5B733E8F82}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BhoNew.Bho\ = "IE Story" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A83359CE-23D4-4E1A-9D4E-C94AEDD1A67C}\VersionIndependentProgID\ = "BhoNew.Bho" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{049652C3-55AE-4A6E-84CE-0C5B733E8F82}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{049652C3-55AE-4A6E-84CE-0C5B733E8F82} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BhoNew.Bho\CLSID\ = "{A83359CE-23D4-4E1A-9D4E-C94AEDD1A67C}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C1D4354E-C81A-4C16-9C41-D6FB49AA31A8}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C1D4354E-C81A-4C16-9C41-D6FB49AA31A8}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C1D4354E-C81A-4C16-9C41-D6FB49AA31A8}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{049652C3-55AE-4A6E-84CE-0C5B733E8F82} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Gorpy\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BhoNew.Bho regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{049652C3-55AE-4A6E-84CE-0C5B733E8F82}\ = "IBho" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{049652C3-55AE-4A6E-84CE-0C5B733E8F82}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BhoNew.Bho\CurVer\ = "Gorpy" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A83359CE-23D4-4E1A-9D4E-C94AEDD1A67C}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BhoNew.Bho\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A83359CE-23D4-4E1A-9D4E-C94AEDD1A67C}\ = "IE Story" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C1D4354E-C81A-4C16-9C41-D6FB49AA31A8}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{049652C3-55AE-4A6E-84CE-0C5B733E8F82}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{049652C3-55AE-4A6E-84CE-0C5B733E8F82}\TypeLib\ = "{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A83359CE-23D4-4E1A-9D4E-C94AEDD1A67C}\TypeLib\ = "{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C1D4354E-C81A-4C16-9C41-D6FB49AA31A8} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C1D4354E-C81A-4C16-9C41-D6FB49AA31A8}\ = "_IBhoEvents" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{049652C3-55AE-4A6E-84CE-0C5B733E8F82}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{049652C3-55AE-4A6E-84CE-0C5B733E8F82}\TypeLib\ = "{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{049652C3-55AE-4A6E-84CE-0C5B733E8F82}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A83359CE-23D4-4E1A-9D4E-C94AEDD1A67C}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Gorpy\CLSID\ = "{A83359CE-23D4-4E1A-9D4E-C94AEDD1A67C}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A83359CE-23D4-4E1A-9D4E-C94AEDD1A67C}\ProgID\ = "Gorpy" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A83359CE-23D4-4E1A-9D4E-C94AEDD1A67C}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF}\1.0\ = "Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C1D4354E-C81A-4C16-9C41-D6FB49AA31A8}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C1D4354E-C81A-4C16-9C41-D6FB49AA31A8}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C1D4354E-C81A-4C16-9C41-D6FB49AA31A8}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A83359CE-23D4-4E1A-9D4E-C94AEDD1A67C} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C1D4354E-C81A-4C16-9C41-D6FB49AA31A8}\TypeLib\ = "{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{049652C3-55AE-4A6E-84CE-0C5B733E8F82}\ = "IBho" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3608 msedge.exe 3608 msedge.exe 2236 msedge.exe 2236 msedge.exe 2856 identity_helper.exe 2856 identity_helper.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5012 wrote to memory of 2236 5012 adaec2245a4b01d2ff9f68260ed9a3ce9ce6754b22a0032d3812e00472a925bb.exe 85 PID 5012 wrote to memory of 2236 5012 adaec2245a4b01d2ff9f68260ed9a3ce9ce6754b22a0032d3812e00472a925bb.exe 85 PID 2236 wrote to memory of 3932 2236 msedge.exe 86 PID 2236 wrote to memory of 3932 2236 msedge.exe 86 PID 5012 wrote to memory of 1564 5012 adaec2245a4b01d2ff9f68260ed9a3ce9ce6754b22a0032d3812e00472a925bb.exe 87 PID 5012 wrote to memory of 1564 5012 adaec2245a4b01d2ff9f68260ed9a3ce9ce6754b22a0032d3812e00472a925bb.exe 87 PID 5012 wrote to memory of 1564 5012 adaec2245a4b01d2ff9f68260ed9a3ce9ce6754b22a0032d3812e00472a925bb.exe 87 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 1884 2236 msedge.exe 89 PID 2236 wrote to memory of 3608 2236 msedge.exe 90 PID 2236 wrote to memory of 3608 2236 msedge.exe 90 PID 2236 wrote to memory of 1528 2236 msedge.exe 92 PID 2236 wrote to memory of 1528 2236 msedge.exe 92 PID 2236 wrote to memory of 1528 2236 msedge.exe 92 PID 2236 wrote to memory of 1528 2236 msedge.exe 92 PID 2236 wrote to memory of 1528 2236 msedge.exe 92 PID 2236 wrote to memory of 1528 2236 msedge.exe 92 PID 2236 wrote to memory of 1528 2236 msedge.exe 92 PID 2236 wrote to memory of 1528 2236 msedge.exe 92 PID 2236 wrote to memory of 1528 2236 msedge.exe 92 PID 2236 wrote to memory of 1528 2236 msedge.exe 92 PID 2236 wrote to memory of 1528 2236 msedge.exe 92 PID 2236 wrote to memory of 1528 2236 msedge.exe 92 PID 2236 wrote to memory of 1528 2236 msedge.exe 92 PID 2236 wrote to memory of 1528 2236 msedge.exe 92 PID 2236 wrote to memory of 1528 2236 msedge.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\adaec2245a4b01d2ff9f68260ed9a3ce9ce6754b22a0032d3812e00472a925bb.exe"C:\Users\Admin\AppData\Local\Temp\adaec2245a4b01d2ff9f68260ed9a3ce9ce6754b22a0032d3812e00472a925bb.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://hotvid44.com/bind2.php?id=39133672⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0x40,0x104,0x7ffd512a46f8,0x7ffd512a4708,0x7ffd512a47183⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,6708339469019887987,10510637371051164221,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:23⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,6708339469019887987,10510637371051164221,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,6708339469019887987,10510637371051164221,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:83⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6708339469019887987,10510637371051164221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3744 /prefetch:13⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6708339469019887987,10510637371051164221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2168 /prefetch:13⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6708339469019887987,10510637371051164221,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4564 /prefetch:13⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2108,6708339469019887987,10510637371051164221,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5364 /prefetch:83⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6708339469019887987,10510637371051164221,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:13⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2108,6708339469019887987,10510637371051164221,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5296 /prefetch:83⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6708339469019887987,10510637371051164221,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:13⤵PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6708339469019887987,10510637371051164221,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:13⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵PID:1780
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x114,0x12c,0x128,0x100,0x120,0x7ff67cdd5460,0x7ff67cdd5470,0x7ff67cdd54804⤵PID:2948
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,6708339469019887987,10510637371051164221,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5892 /prefetch:83⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,6708339469019887987,10510637371051164221,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5892 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6708339469019887987,10510637371051164221,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6208 /prefetch:13⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6708339469019887987,10510637371051164221,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:13⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2108,6708339469019887987,10510637371051164221,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:83⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2108,6708339469019887987,10510637371051164221,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:83⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6708339469019887987,10510637371051164221,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4360 /prefetch:13⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2108,6708339469019887987,10510637371051164221,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6192 /prefetch:83⤵PID:364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,6708339469019887987,10510637371051164221,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5836 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2108,6708339469019887987,10510637371051164221,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6136 /prefetch:83⤵PID:4632
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Windows\system32\haxo.dll"2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:1564
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3208
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5f6a2a59a84cd7d3bb109ad6acdd7ba39
SHA1c0dc3e9ee183fbe659830d8b65791f6dd993e668
SHA256a221c8b0bdbce003df66f7bed5236b304980f70a297ee85c56f94ed1dac67c9d
SHA512f1d2239da5562e1f8a9fb089077288d1c0bed0908bd669a5638e97a6c874bcdd0bfc48b1be2a77837f984465f4a50bb17ca34291f1e0f97ac49f14451ebf3d7b
-
Filesize
52KB
MD5f6a2a59a84cd7d3bb109ad6acdd7ba39
SHA1c0dc3e9ee183fbe659830d8b65791f6dd993e668
SHA256a221c8b0bdbce003df66f7bed5236b304980f70a297ee85c56f94ed1dac67c9d
SHA512f1d2239da5562e1f8a9fb089077288d1c0bed0908bd669a5638e97a6c874bcdd0bfc48b1be2a77837f984465f4a50bb17ca34291f1e0f97ac49f14451ebf3d7b