Analysis
-
max time kernel
153s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2022 18:43
Static task
static1
Behavioral task
behavioral1
Sample
3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe
Resource
win10v2004-20220812-en
General
-
Target
3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe
-
Size
148KB
-
MD5
0715e3716413bb6a08a48fdb6affc560
-
SHA1
85f7ce09f3575692b1c647940cab6d6a46fdba32
-
SHA256
3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4
-
SHA512
e0b6b0de2d417fa903544c37837bc365edc9be622dab1272029f2537b5f3c5a4b79974536b832655f36a85552b735561c61446ac750f0b803ad43297a2276c68
-
SSDEEP
1536:0RmDgjvo1M8oXtHjrbZ4zynEPOv2sQJ1F/1fPWNltTwCYmdyDLLLLLLLL1FLqzi:gDToD8/Z5EPO+sQJZWNltTtiLqz
Malware Config
Signatures
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-2629973501-4017243118-3254762364-1000\desktop.ini 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened (read-only) \??\S: 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened (read-only) \??\P: 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened (read-only) \??\N: 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened (read-only) \??\K: 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened (read-only) \??\J: 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened (read-only) \??\I: 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened (read-only) \??\H: 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened (read-only) \??\F: 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened (read-only) \??\Z: 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened (read-only) \??\X: 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened (read-only) \??\U: 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened (read-only) \??\T: 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened (read-only) \??\R: 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened (read-only) \??\Q: 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened (read-only) \??\Y: 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened (read-only) \??\V: 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened (read-only) \??\O: 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened (read-only) \??\E: 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened (read-only) \??\W: 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened (read-only) \??\M: 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened (read-only) \??\L: 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\MEDIA\APPLAUSE.WAV 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-lib-uihandler.xml 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ExcelVL_MAK-pl.xrm-ms 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019R_Grace-ul-oob.xrm-ms 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdR_Grace-ul-oob.xrm-ms 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\FOLDER.ICO 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.contrast-white_scale-140.png 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\vccorlib140.dll 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Help\hxds.dll 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Common Files\System\msadc\fr-FR\msdaremr.dll.mui 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\MANIFEST.MF 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-0090-0000-1000-0000000FF1CE.xml 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PowerPoint2019VL_MAK_AE-ppd.xrm-ms 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdCO365R_Subscription-ul-oob.xrm-ms 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\CHAKRACORE.DLL 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\CalibriLI.ttf 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.en-us.dll 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-javahelp.xml 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-sampler.jar 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp2-ul-oob.xrm-ms 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365EduCloudEDUR_SubTrial-pl.xrm-ms 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp-ul-oob.xrm-ms 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SkypeSrv\SKYPESERVER.EXE 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ClassicPhotoAlbum.potx 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOLoader.dll 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Common Files\System\ado\msador15.dll 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.osgi.compatibility.state.nl_ja_4.4.0.v20140623020002.jar 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-core-io-ui.xml 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Red Violet.xml 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019XC2RVL_KMS_ClientC2R-ul-oob.xrm-ms 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogoSmall.contrast-white_scale-80.png 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTrial2-ppd.xrm-ms 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019R_OEM_Perp-ul-phn.xrm-ms 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessPipcR_Grace-ul-oob.xrm-ms 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdR_Grace-ul-oob.xrm-ms 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365BusinessR_SubTrial-pl.xrm-ms 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019VL_KMS_Client_AE-ul.xrm-ms 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PersonaSpy\office.core.operational.js 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PROOF\MSHY7EN.LEX 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\osm.x-none.msi.16.x-none.tree.dat 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Common Files\System\msadc\msaddsr.dll 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-print_ja.jar 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\zip.dll 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\TellMeExcel.nrr 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Library\Analysis\ATPVBAEN.XLAM 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\1033\MSOINTL.DLL 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-progress-ui_ja.jar 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Standard2019VL_KMS_Client_AE-ppd.xrm-ms 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogo.contrast-black_scale-140.png 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\Cartridges\as80.xsl 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OFFSYMSL.TTF 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ecf.ssl_1.1.0.v20140827-1444.jar 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\org-netbeans-modules-profiler-attach.jar 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-oql.xml 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp2-ul-phn.xrm-ms 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Grace-ppd.xrm-ms 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\EXCEL.HXS 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected] 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\pl-PL\tipresx.dll.mui 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-uisupport.xml 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019XC2RVL_MAKC2R-ul-phn.xrm-ms 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3380 msedge.exe 3380 msedge.exe 1792 msedge.exe 1792 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2108 wrote to memory of 5064 2108 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe 81 PID 2108 wrote to memory of 5064 2108 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe 81 PID 2108 wrote to memory of 5064 2108 3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe 81 PID 1312 wrote to memory of 1792 1312 explorer.exe 83 PID 1312 wrote to memory of 1792 1312 explorer.exe 83 PID 1792 wrote to memory of 5116 1792 msedge.exe 86 PID 1792 wrote to memory of 5116 1792 msedge.exe 86 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 4784 1792 msedge.exe 89 PID 1792 wrote to memory of 3380 1792 msedge.exe 90 PID 1792 wrote to memory of 3380 1792 msedge.exe 90 PID 1792 wrote to memory of 644 1792 msedge.exe 92 PID 1792 wrote to memory of 644 1792 msedge.exe 92 PID 1792 wrote to memory of 644 1792 msedge.exe 92 PID 1792 wrote to memory of 644 1792 msedge.exe 92 PID 1792 wrote to memory of 644 1792 msedge.exe 92 PID 1792 wrote to memory of 644 1792 msedge.exe 92 PID 1792 wrote to memory of 644 1792 msedge.exe 92 PID 1792 wrote to memory of 644 1792 msedge.exe 92 PID 1792 wrote to memory of 644 1792 msedge.exe 92 PID 1792 wrote to memory of 644 1792 msedge.exe 92 PID 1792 wrote to memory of 644 1792 msedge.exe 92 PID 1792 wrote to memory of 644 1792 msedge.exe 92 PID 1792 wrote to memory of 644 1792 msedge.exe 92 PID 1792 wrote to memory of 644 1792 msedge.exe 92 PID 1792 wrote to memory of 644 1792 msedge.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe"C:\Users\Admin\AppData\Local\Temp\3c1082afe579862b6d02a7a6cb576e40fb18c0b8fd8b6fc04d32f4d576d23dc4.exe"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\explorer.exeexplorer http://www.i2s-lab.com/sophos.htm2⤵PID:5064
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.i2s-lab.com/sophos.htm2⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xd8,0xfc,0x100,0x40,0x104,0x7ffe4fa746f8,0x7ffe4fa74708,0x7ffe4fa747183⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,13879346714452382044,154935275150640831,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:23⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,13879346714452382044,154935275150640831,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,13879346714452382044,154935275150640831,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:83⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,13879346714452382044,154935275150640831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:13⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,13879346714452382044,154935275150640831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:13⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,13879346714452382044,154935275150640831,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:13⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,13879346714452382044,154935275150640831,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4356 /prefetch:13⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,13879346714452382044,154935275150640831,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4560 /prefetch:13⤵PID:2392
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1112