Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2022 20:29
Static task
static1
Behavioral task
behavioral1
Sample
390c6a70c5f09f688567145974de4d5ffd6d890e134c8e6725ec3cd91868d495.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
390c6a70c5f09f688567145974de4d5ffd6d890e134c8e6725ec3cd91868d495.exe
Resource
win10v2004-20220901-en
General
-
Target
390c6a70c5f09f688567145974de4d5ffd6d890e134c8e6725ec3cd91868d495.exe
-
Size
1.3MB
-
MD5
598b4477c5ce8920b377f808ce666c4a
-
SHA1
a3c5d98f2b895b9fd60e3090143234a51cac81b4
-
SHA256
390c6a70c5f09f688567145974de4d5ffd6d890e134c8e6725ec3cd91868d495
-
SHA512
3b97b59fbaaf9ad43b6da7d92b602b506559c562479937e4a50a5bfc539a313eaed8e2598a150be659ddfcfb6a175176d1e5254b516d5c39d08ae57c77c6e7d8
-
SSDEEP
24576:+pINQhyjAhM97x6PpSi6/I/6AjqRVZntMw91e:+g+M9apTEIYl2wO
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\safe.ico 390c6a70c5f09f688567145974de4d5ffd6d890e134c8e6725ec3cd91868d495.exe -
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\progra~1\ico\1a1fa28d294541b49eab235a9e3a0cec$dpx$.tmp\63afd0fb9c4c1743aeddcc3d98c2dd42.tmp expand.exe File opened for modification C:\progra~1\ico\{F1CC0B5F-BE9A-474F-9B8C-9794DA18DAE9} expand.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\0ead37ca-1d1d-4a30-9bc1-ddcfdcdbe9e5.tmp setup.exe File opened for modification C:\progra~1\ico\Beauty.ico expand.exe File created C:\progra~1\ico\1a1fa28d294541b49eab235a9e3a0cec$dpx$.tmp\f64125ee5be4554dba9fb61ed01d0db2.tmp expand.exe File created C:\progra~1\ico\1a1fa28d294541b49eab235a9e3a0cec$dpx$.tmp\d1182adc2803d24c862af8c1c278450a.tmp expand.exe File opened for modification C:\progra~1\ico\Taobao.ico expand.exe File opened for modification C:\progra~1\ico\Video.ico expand.exe File opened for modification C:\progra~1\ico\1a1fa28d294541b49eab235a9e3a0cec$dpx$.tmp expand.exe File created C:\progra~1\ico\1a1fa28d294541b49eab235a9e3a0cec$dpx$.tmp\e11fc958b47b434389d693b0e29ebe96.tmp expand.exe File opened for modification C:\progra~1\ico\Film.ico expand.exe File created C:\progra~1\ico\1a1fa28d294541b49eab235a9e3a0cec$dpx$.tmp\3c670c91ac55464ab9c4977b67ae7bc5.tmp expand.exe File opened for modification C:\progra~1\ico\meiv.ico expand.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221030042350.pma setup.exe File opened for modification C:\progra~1\ico\1a1fa28d294541b49eab235a9e3a0cec$dpx$.tmp\job.xml expand.exe File opened for modification C:\progra~1\ico\Chat.ico expand.exe File created C:\progra~1\ico\1a1fa28d294541b49eab235a9e3a0cec$dpx$.tmp\cc87698bbf54c74b91bfe6ae5fce38fb.tmp expand.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\LOGS\DPX\setupact.log expand.exe File opened for modification C:\Windows\LOGS\DPX\setuperr.log expand.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2248 390c6a70c5f09f688567145974de4d5ffd6d890e134c8e6725ec3cd91868d495.exe 2248 390c6a70c5f09f688567145974de4d5ffd6d890e134c8e6725ec3cd91868d495.exe 2248 390c6a70c5f09f688567145974de4d5ffd6d890e134c8e6725ec3cd91868d495.exe 2248 390c6a70c5f09f688567145974de4d5ffd6d890e134c8e6725ec3cd91868d495.exe 4656 msedge.exe 4656 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 4088 identity_helper.exe 4088 identity_helper.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2248 390c6a70c5f09f688567145974de4d5ffd6d890e134c8e6725ec3cd91868d495.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2248 390c6a70c5f09f688567145974de4d5ffd6d890e134c8e6725ec3cd91868d495.exe 2248 390c6a70c5f09f688567145974de4d5ffd6d890e134c8e6725ec3cd91868d495.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2248 wrote to memory of 4824 2248 390c6a70c5f09f688567145974de4d5ffd6d890e134c8e6725ec3cd91868d495.exe 82 PID 2248 wrote to memory of 4824 2248 390c6a70c5f09f688567145974de4d5ffd6d890e134c8e6725ec3cd91868d495.exe 82 PID 2248 wrote to memory of 4824 2248 390c6a70c5f09f688567145974de4d5ffd6d890e134c8e6725ec3cd91868d495.exe 82 PID 2248 wrote to memory of 3408 2248 390c6a70c5f09f688567145974de4d5ffd6d890e134c8e6725ec3cd91868d495.exe 83 PID 2248 wrote to memory of 3408 2248 390c6a70c5f09f688567145974de4d5ffd6d890e134c8e6725ec3cd91868d495.exe 83 PID 2248 wrote to memory of 3408 2248 390c6a70c5f09f688567145974de4d5ffd6d890e134c8e6725ec3cd91868d495.exe 83 PID 4824 wrote to memory of 3012 4824 cmd.exe 86 PID 4824 wrote to memory of 3012 4824 cmd.exe 86 PID 4824 wrote to memory of 3012 4824 cmd.exe 86 PID 4760 wrote to memory of 220 4760 explorer.exe 87 PID 4760 wrote to memory of 220 4760 explorer.exe 87 PID 220 wrote to memory of 4516 220 msedge.exe 89 PID 220 wrote to memory of 4516 220 msedge.exe 89 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 3720 220 msedge.exe 91 PID 220 wrote to memory of 4656 220 msedge.exe 92 PID 220 wrote to memory of 4656 220 msedge.exe 92 PID 220 wrote to memory of 1184 220 msedge.exe 94 PID 220 wrote to memory of 1184 220 msedge.exe 94 PID 220 wrote to memory of 1184 220 msedge.exe 94 PID 220 wrote to memory of 1184 220 msedge.exe 94 PID 220 wrote to memory of 1184 220 msedge.exe 94 PID 220 wrote to memory of 1184 220 msedge.exe 94 PID 220 wrote to memory of 1184 220 msedge.exe 94 PID 220 wrote to memory of 1184 220 msedge.exe 94 PID 220 wrote to memory of 1184 220 msedge.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\390c6a70c5f09f688567145974de4d5ffd6d890e134c8e6725ec3cd91868d495.exe"C:\Users\Admin\AppData\Local\Temp\390c6a70c5f09f688567145974de4d5ffd6d890e134c8e6725ec3cd91868d495.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\U3irf.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\expand.exeexpand.exe "C:\Users\Admin\AppData\Local\Temp\ico.cab" -F:*.* "C:\progra~1\ico"3⤵
- Drops file in Program Files directory
- Drops file in Windows directory
PID:3012
-
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe http://www.v258.net/list/list16.html?mmm2⤵PID:3408
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.v258.net/list/list16.html?mmm2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff82d9d46f8,0x7ff82d9d4708,0x7ff82d9d47183⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,13445485700935220125,5278357916975613077,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:23⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,13445485700935220125,5278357916975613077,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,13445485700935220125,5278357916975613077,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2972 /prefetch:83⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13445485700935220125,5278357916975613077,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3808 /prefetch:13⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13445485700935220125,5278357916975613077,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3816 /prefetch:13⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2136,13445485700935220125,5278357916975613077,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4464 /prefetch:83⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13445485700935220125,5278357916975613077,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:13⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13445485700935220125,5278357916975613077,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:13⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2136,13445485700935220125,5278357916975613077,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5568 /prefetch:83⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13445485700935220125,5278357916975613077,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:13⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13445485700935220125,5278357916975613077,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:13⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,13445485700935220125,5278357916975613077,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:83⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:3756 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1c4,0x22c,0x7ff7cbf35460,0x7ff7cbf35470,0x7ff7cbf354804⤵PID:2864
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,13445485700935220125,5278357916975613077,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13445485700935220125,5278357916975613077,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:13⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13445485700935220125,5278357916975613077,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3084 /prefetch:13⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2136,13445485700935220125,5278357916975613077,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1896 /prefetch:83⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2136,13445485700935220125,5278357916975613077,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:83⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2136,13445485700935220125,5278357916975613077,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1868 /prefetch:83⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13445485700935220125,5278357916975613077,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:13⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2136,13445485700935220125,5278357916975613077,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1896 /prefetch:83⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,13445485700935220125,5278357916975613077,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5600 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2136,13445485700935220125,5278357916975613077,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:83⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2136,13445485700935220125,5278357916975613077,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6032 /prefetch:83⤵PID:3804
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1324
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98B
MD5ada787702460241a372c495dc53dbdcf
SHA1da7d65ec9541fe9ed13b3531f38202f83b0ac96d
SHA2560d0f600f95192d2d602dbda346c4e08745295f331f5a0349deae21705367b850
SHA512c86091735b855691c89c7946145591dec6a6a6a36a2438d392587a9cc1f2d85c1ebe44fcff1cc9d94271a24ebbc2ca38639577a6f5c592e9e10517da26572708
-
Filesize
20KB
MD51319e9998cedc513c68fa6d590b6ad63
SHA1ae95b333e88a13886994f320f5dfb4856168a710
SHA2569a5b18efe243fbe9b9b0be3674a24080e9210436986988f3f85a4007905083bb
SHA512d4052a899c6c310296e2f5fdf6c2031c22d2644be620cb34ddcc6b59789d82a6462daaeb34466c568be48ee975c4a5ab43143eab0792312a6cd0d49f9fbd8d3f