Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2022, 22:11
Static task
static1
Behavioral task
behavioral1
Sample
a9f43ef0b06830d6dc965d3cdb1f0ffb53e304676aadc01cf658c7c3e63502ad.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a9f43ef0b06830d6dc965d3cdb1f0ffb53e304676aadc01cf658c7c3e63502ad.exe
Resource
win10v2004-20220901-en
General
-
Target
a9f43ef0b06830d6dc965d3cdb1f0ffb53e304676aadc01cf658c7c3e63502ad.exe
-
Size
668KB
-
MD5
84ae63f85c75ceedb5e10acd1cdbb32d
-
SHA1
310cfaa0c80efa7128dabe7744be50df4522eb57
-
SHA256
a9f43ef0b06830d6dc965d3cdb1f0ffb53e304676aadc01cf658c7c3e63502ad
-
SHA512
a0f3bd2f3ad92255fbe16386b69f4b25fbfa69282fc2ef122900bcf7c27006b23af99a4d9de39148fb4afc7bd2f1ee211c0a3aac567d47706a667f7bc9abdfdc
-
SSDEEP
12288:/ArC/wrr9nkDpf+QsDJGhGszVuWSXLRmseOara:/Akwf9ekQsEgssLcs
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3328 process32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation a9f43ef0b06830d6dc965d3cdb1f0ffb53e304676aadc01cf658c7c3e63502ad.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\siVjuBsctt = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\tempfile.exe\"" a9f43ef0b06830d6dc965d3cdb1f0ffb53e304676aadc01cf658c7c3e63502ad.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2444 set thread context of 3328 2444 a9f43ef0b06830d6dc965d3cdb1f0ffb53e304676aadc01cf658c7c3e63502ad.exe 82 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\623cd537-3405-478c-a603-54bd90e6aff3.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221030065100.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings a9f43ef0b06830d6dc965d3cdb1f0ffb53e304676aadc01cf658c7c3e63502ad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 640 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1092 msedge.exe 1092 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 1880 identity_helper.exe 1880 identity_helper.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2444 a9f43ef0b06830d6dc965d3cdb1f0ffb53e304676aadc01cf658c7c3e63502ad.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2444 wrote to memory of 3328 2444 a9f43ef0b06830d6dc965d3cdb1f0ffb53e304676aadc01cf658c7c3e63502ad.exe 82 PID 2444 wrote to memory of 3328 2444 a9f43ef0b06830d6dc965d3cdb1f0ffb53e304676aadc01cf658c7c3e63502ad.exe 82 PID 2444 wrote to memory of 3328 2444 a9f43ef0b06830d6dc965d3cdb1f0ffb53e304676aadc01cf658c7c3e63502ad.exe 82 PID 2444 wrote to memory of 3328 2444 a9f43ef0b06830d6dc965d3cdb1f0ffb53e304676aadc01cf658c7c3e63502ad.exe 82 PID 2444 wrote to memory of 3328 2444 a9f43ef0b06830d6dc965d3cdb1f0ffb53e304676aadc01cf658c7c3e63502ad.exe 82 PID 2444 wrote to memory of 3328 2444 a9f43ef0b06830d6dc965d3cdb1f0ffb53e304676aadc01cf658c7c3e63502ad.exe 82 PID 2444 wrote to memory of 3328 2444 a9f43ef0b06830d6dc965d3cdb1f0ffb53e304676aadc01cf658c7c3e63502ad.exe 82 PID 2444 wrote to memory of 3328 2444 a9f43ef0b06830d6dc965d3cdb1f0ffb53e304676aadc01cf658c7c3e63502ad.exe 82 PID 2444 wrote to memory of 640 2444 a9f43ef0b06830d6dc965d3cdb1f0ffb53e304676aadc01cf658c7c3e63502ad.exe 83 PID 2444 wrote to memory of 640 2444 a9f43ef0b06830d6dc965d3cdb1f0ffb53e304676aadc01cf658c7c3e63502ad.exe 83 PID 2444 wrote to memory of 640 2444 a9f43ef0b06830d6dc965d3cdb1f0ffb53e304676aadc01cf658c7c3e63502ad.exe 83 PID 3328 wrote to memory of 2540 3328 process32.exe 84 PID 3328 wrote to memory of 2540 3328 process32.exe 84 PID 2540 wrote to memory of 3596 2540 msedge.exe 85 PID 2540 wrote to memory of 3596 2540 msedge.exe 85 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 3936 2540 msedge.exe 87 PID 2540 wrote to memory of 1092 2540 msedge.exe 88 PID 2540 wrote to memory of 1092 2540 msedge.exe 88 PID 2540 wrote to memory of 2520 2540 msedge.exe 90 PID 2540 wrote to memory of 2520 2540 msedge.exe 90 PID 2540 wrote to memory of 2520 2540 msedge.exe 90 PID 2540 wrote to memory of 2520 2540 msedge.exe 90 PID 2540 wrote to memory of 2520 2540 msedge.exe 90 PID 2540 wrote to memory of 2520 2540 msedge.exe 90 PID 2540 wrote to memory of 2520 2540 msedge.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9f43ef0b06830d6dc965d3cdb1f0ffb53e304676aadc01cf658c7c3e63502ad.exe"C:\Users\Admin\AppData\Local\Temp\a9f43ef0b06830d6dc965d3cdb1f0ffb53e304676aadc01cf658c7c3e63502ad.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\process32.exeC:\Users\Admin\AppData\Local\Temp\\process32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=process32.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.03⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xd4,0x110,0x7ffc2f6746f8,0x7ffc2f674708,0x7ffc2f6747184⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,17994382683155453390,15237519527609372228,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:24⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,17994382683155453390,15237519527609372228,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,17994382683155453390,15237519527609372228,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:84⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,17994382683155453390,15237519527609372228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:14⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,17994382683155453390,15237519527609372228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:14⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,17994382683155453390,15237519527609372228,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:14⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2136,17994382683155453390,15237519527609372228,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5040 /prefetch:84⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,17994382683155453390,15237519527609372228,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:14⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,17994382683155453390,15237519527609372228,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:14⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2136,17994382683155453390,15237519527609372228,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3680 /prefetch:84⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,17994382683155453390,15237519527609372228,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:14⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,17994382683155453390,15237519527609372228,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6212 /prefetch:14⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,17994382683155453390,15237519527609372228,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6616 /prefetch:84⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings4⤵
- Drops file in Program Files directory
PID:3688 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff6c9755460,0x7ff6c9755470,0x7ff6c97554805⤵PID:4440
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,17994382683155453390,15237519527609372228,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6616 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2136,17994382683155453390,15237519527609372228,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5348 /prefetch:84⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2136,17994382683155453390,15237519527609372228,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3160 /prefetch:84⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2136,17994382683155453390,15237519527609372228,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3136 /prefetch:84⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,17994382683155453390,15237519527609372228,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6048 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:3604
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=process32.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.03⤵PID:4564
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe4,0x108,0x7ffc2f6746f8,0x7ffc2f674708,0x7ffc2f6747184⤵PID:4420
-
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Dani.txt2⤵
- Opens file in notepad (likely ransom note)
PID:640
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3692
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51aa7e0f203b5b0b2f753567d77fbe2d9
SHA1443937fd906e3a356a6689181b29a9e849f54209
SHA25627f1577aa081b2222b6549e74de58ef60bf0a054c7b2a345366e6ebbf44fab8c
SHA512ce2fff1ddfab2e82f4e8ec6b3d04405f9fb2ad07dccfdde404411de9bbc66033610ad1689316173878be9758bb822612d4a931901e1ed4bbbd41199c2885debf
-
Filesize
152B
MD566bc9611dd085dd5e1366c94b84456cd
SHA1613339f5891bf2c9e54ef565c54eb18be42d65fb
SHA25627b4949b239ca2e2ce7812dd455868d97ce9c4851bb46eb0d7d5827285dd6c22
SHA512196973df9961ef3c91af4836cabe58b6e7df8aa410867ec6769b1407eea99532faf7c6efd351d4ef81f0ab12527756fd146fbe02220c93b9ced8368bd0488be6
-
Filesize
5KB
MD5d2ed8fa3208e702b7d61728af768eed1
SHA154094aa272cb866a46c2ca5b56f4a094e0f48ffb
SHA2569236208e312b2f47a0ef40e59fc0f364fc8e401717e1e46555c26bec8ab3de1f
SHA51242442dc0b98f2abaea0c6516602d80df8a2a680278ecdc2b96fe5ce44685f7442347fd4ad13d9d99e0330cf0be7c0e9bbf22bd78c0173066221e430203c76313
-
Filesize
5KB
MD5d2ed8fa3208e702b7d61728af768eed1
SHA154094aa272cb866a46c2ca5b56f4a094e0f48ffb
SHA2569236208e312b2f47a0ef40e59fc0f364fc8e401717e1e46555c26bec8ab3de1f
SHA51242442dc0b98f2abaea0c6516602d80df8a2a680278ecdc2b96fe5ce44685f7442347fd4ad13d9d99e0330cf0be7c0e9bbf22bd78c0173066221e430203c76313