Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2022, 05:26
Behavioral task
behavioral1
Sample
f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe
Resource
win10v2004-20220901-en
General
-
Target
f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe
-
Size
3.3MB
-
MD5
37ee41fa2c86fdc56121ac6b5a4b4a77
-
SHA1
7290855dd784e2d40d8149783d4d015ccba23cb9
-
SHA256
f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723
-
SHA512
e903de540d51c409655e33228c011a5bc25992633eb74dac61434f7f5c107ec76e2658ff4c3e5a302a9df36f01a6dc124411369cbb1ef9f6d3d2431cfce75020
-
SSDEEP
49152:dyFhY1yf+4TrQQ3LKq9sYt0zZWxG/ZAq8zrFyPGgqvsmJfwfkcSdO:d0YSXrQQWq9sYGz38XFyPlWYfk
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe File created C:\Windows\System32\drivers\etc\hosts.ics f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe -
Executes dropped EXE 3 IoCs
pid Process 4892 a.exe 4568 miniads.exe 3712 runads.exe -
resource yara_rule behavioral2/memory/4648-135-0x0000000000400000-0x0000000000BBD000-memory.dmp vmprotect behavioral2/memory/4648-136-0x0000000000400000-0x0000000000BBD000-memory.dmp vmprotect behavioral2/memory/4648-139-0x0000000000400000-0x0000000000BBD000-memory.dmp vmprotect behavioral2/memory/4648-158-0x0000000000400000-0x0000000000BBD000-memory.dmp vmprotect behavioral2/memory/4648-164-0x0000000000400000-0x0000000000BBD000-memory.dmp vmprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dllshell.dll a.exe File opened for modification C:\Windows\SysWOW64\miniads3.exe a.exe File opened for modification C:\Windows\SysWOW64\miniads2.exe a.exe File opened for modification C:\Windows\SysWOW64\miniads.exe a.exe File opened for modification C:\Windows\SysWOW64\runads.exe a.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221029090920.pma setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\9212da27-525d-4fb2-9324-ae7c372a8de0.tmp setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.vinacf.info" f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 4892 a.exe 4892 a.exe 4892 a.exe 4892 a.exe 4892 a.exe 4892 a.exe 3712 runads.exe 3712 runads.exe 3712 runads.exe 3712 runads.exe 3712 runads.exe 3712 runads.exe 3712 runads.exe 3712 runads.exe 3712 runads.exe 3712 runads.exe 3712 runads.exe 3712 runads.exe 3712 runads.exe 3712 runads.exe 4028 msedge.exe 4028 msedge.exe 3712 runads.exe 3712 runads.exe 3712 runads.exe 3712 runads.exe 3712 runads.exe 3712 runads.exe 3712 runads.exe 3712 runads.exe 3712 runads.exe 3712 runads.exe 3712 runads.exe 3712 runads.exe 3712 runads.exe 3712 runads.exe 3712 runads.exe 3712 runads.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 0 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe Token: 0 4892 a.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 4892 a.exe 4568 miniads.exe 4568 miniads.exe 4568 miniads.exe 3712 runads.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4648 wrote to memory of 1272 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 89 PID 4648 wrote to memory of 1272 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 89 PID 4648 wrote to memory of 4892 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 91 PID 4648 wrote to memory of 4892 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 91 PID 4648 wrote to memory of 4892 4648 f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe 91 PID 1272 wrote to memory of 3196 1272 msedge.exe 90 PID 1272 wrote to memory of 3196 1272 msedge.exe 90 PID 4892 wrote to memory of 4568 4892 a.exe 92 PID 4892 wrote to memory of 4568 4892 a.exe 92 PID 4892 wrote to memory of 4568 4892 a.exe 92 PID 4892 wrote to memory of 3712 4892 a.exe 93 PID 4892 wrote to memory of 3712 4892 a.exe 93 PID 4892 wrote to memory of 3712 4892 a.exe 93 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 1316 1272 msedge.exe 96 PID 1272 wrote to memory of 4028 1272 msedge.exe 97 PID 1272 wrote to memory of 4028 1272 msedge.exe 97 PID 1272 wrote to memory of 2220 1272 msedge.exe 99 PID 1272 wrote to memory of 2220 1272 msedge.exe 99 PID 1272 wrote to memory of 2220 1272 msedge.exe 99 PID 1272 wrote to memory of 2220 1272 msedge.exe 99 PID 1272 wrote to memory of 2220 1272 msedge.exe 99 PID 1272 wrote to memory of 2220 1272 msedge.exe 99 PID 1272 wrote to memory of 2220 1272 msedge.exe 99 PID 1272 wrote to memory of 2220 1272 msedge.exe 99 PID 1272 wrote to memory of 2220 1272 msedge.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe"C:\Users\Admin\AppData\Local\Temp\f16f6fa974e1362a8bb82849a886fcaab13a5e8df8e915305102bd402a15a723.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.vinacf.info/2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffceea846f8,0x7ffceea84708,0x7ffceea847183⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,2111431748427718818,7872335774147731747,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:23⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,2111431748427718818,7872335774147731747,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,2111431748427718818,7872335774147731747,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2976 /prefetch:83⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2111431748427718818,7872335774147731747,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3596 /prefetch:13⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2111431748427718818,7872335774147731747,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3708 /prefetch:13⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2136,2111431748427718818,7872335774147731747,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4972 /prefetch:83⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2111431748427718818,7872335774147731747,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:13⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2111431748427718818,7872335774147731747,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:13⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2136,2111431748427718818,7872335774147731747,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5860 /prefetch:83⤵PID:608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2111431748427718818,7872335774147731747,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6312 /prefetch:13⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,2111431748427718818,7872335774147731747,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3984 /prefetch:83⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:396 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x200,0x224,0x228,0x1c0,0x22c,0x7ff7c0215460,0x7ff7c0215470,0x7ff7c02154804⤵PID:4644
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,2111431748427718818,7872335774147731747,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3984 /prefetch:83⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2136,2111431748427718818,7872335774147731747,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6072 /prefetch:83⤵PID:364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2136,2111431748427718818,7872335774147731747,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:83⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2136,2111431748427718818,7872335774147731747,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:83⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,2111431748427718818,7872335774147731747,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2880 /prefetch:23⤵PID:1592
-
-
-
C:\Users\Admin\AppData\Local\Temp\a.exe"C:\Users\Admin\AppData\Local\Temp\a.exe" 02⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\miniads.exeC:\Windows\System32\miniads.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4568
-
-
C:\Windows\SysWOW64\runads.exeC:\Windows\System32\runads.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3712
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5116
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
316KB
MD53d6615a38a2cf242e43463e8ca6e7107
SHA13dd70c810be1110f96d84f9ee7c4336ceb3dd798
SHA256de7fe6260a5757de4d6dae6fcf23e9a958db3d9a50e1e1b4d85f8be98f1464f1
SHA512742bad3f9849b5727a763f6f2769c1c7791c7ff9344c2d0268267fd7510bd858fde40952127f70b000f95be7e6ee9b9d6e1b32d35efaaf68d5aba7a66aca0d4f
-
Filesize
316KB
MD53d6615a38a2cf242e43463e8ca6e7107
SHA13dd70c810be1110f96d84f9ee7c4336ceb3dd798
SHA256de7fe6260a5757de4d6dae6fcf23e9a958db3d9a50e1e1b4d85f8be98f1464f1
SHA512742bad3f9849b5727a763f6f2769c1c7791c7ff9344c2d0268267fd7510bd858fde40952127f70b000f95be7e6ee9b9d6e1b32d35efaaf68d5aba7a66aca0d4f
-
Filesize
44KB
MD5df1141020ca2ad1f0e0c27b93a41ab0c
SHA12134bbda2f1143fbc4dcbc7b9357750b2f87651e
SHA25697818d6c5da2e5181670fb54e82b7678a58e1e95bb01ab9721afcceb47971484
SHA512b0accf55c0c4be6473320a3c89fda45c64187ad0ea6f37449de8bb49ed55205301e02c4de8979484fcd954841a0135a80928687cf779e0931493156c5a5b708f
-
Filesize
44KB
MD5df1141020ca2ad1f0e0c27b93a41ab0c
SHA12134bbda2f1143fbc4dcbc7b9357750b2f87651e
SHA25697818d6c5da2e5181670fb54e82b7678a58e1e95bb01ab9721afcceb47971484
SHA512b0accf55c0c4be6473320a3c89fda45c64187ad0ea6f37449de8bb49ed55205301e02c4de8979484fcd954841a0135a80928687cf779e0931493156c5a5b708f
-
Filesize
32KB
MD5f4e87ce869ae8861f81fa48f3db71e23
SHA1b435e3e621398d355ab7daad02d29860728bc7b6
SHA2568ed40e4dc0ea494017d30cb2c862d2c713ccf6d853e57061ea9ff8621f28255c
SHA512640f5ffa6243232bd068518176f827011c795e6bb3302eacedbcbf055bafb7056cd97ef445027155d358952879bc7c0d295ed31b6d8480b81f39d256037c95f2
-
Filesize
32KB
MD5f4e87ce869ae8861f81fa48f3db71e23
SHA1b435e3e621398d355ab7daad02d29860728bc7b6
SHA2568ed40e4dc0ea494017d30cb2c862d2c713ccf6d853e57061ea9ff8621f28255c
SHA512640f5ffa6243232bd068518176f827011c795e6bb3302eacedbcbf055bafb7056cd97ef445027155d358952879bc7c0d295ed31b6d8480b81f39d256037c95f2
-
Filesize
2B
MD581051bcc2cf1bedf378224b0a93e2877
SHA1ba8ab5a0280b953aa97435ff8946cbcbb2755a27
SHA2567eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6
SHA5121b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d