Analysis
-
max time kernel
189s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2022 21:48
Behavioral task
behavioral1
Sample
bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe
Resource
win10v2004-20220812-en
General
-
Target
bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe
-
Size
829KB
-
MD5
0b835d9a77cd422b7e5914c8b964e3a0
-
SHA1
3d06fecc6e7d428d23a52ac487d2f3616f38174c
-
SHA256
bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3
-
SHA512
5db0b80abe7f2bed42f32f96b5608228c76f53b9a2e9cb63b01bce2912bfbd82de441a9643d79da54207f8ec4386c0c0b6018020db0c375f4d556bb6458023ee
-
SSDEEP
12288:R2oyM3bYl9sGKVCQVW5Y24coyuWRzQtL+4vl5f1MLUQDkZbdv/fcqjySA5t8MQ2p:R+M0laGxruWxQh+1UQDkZt/EExMFp
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x000a000000022e38-134.dat aspack_v212_v242 behavioral2/files/0x000a000000022e38-135.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\1892cae3-cf1f-45a7-b5d6-76f312598c3a.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221110061157.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\safejy.com bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\safejy.com\NumberOfSubdomains = "1" bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.safejy.com bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.safejy.com\ = "63" bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\safejy.com\Total = "63" bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\IESettingSync bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DOMStorage\safejy.com bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4776 bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 4776 bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 4776 bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 4776 bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 4776 bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 4776 bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 4776 bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 4776 bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 4776 bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 4776 bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 4776 bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 4776 bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 4776 bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 4776 bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 4776 bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 4776 bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4776 bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 4776 bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 728 copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4776 wrote to memory of 728 4776 bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 79 PID 4776 wrote to memory of 728 4776 bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 79 PID 4776 wrote to memory of 728 4776 bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 79 PID 4776 wrote to memory of 4556 4776 bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 80 PID 4776 wrote to memory of 4556 4776 bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe 80 PID 4556 wrote to memory of 5000 4556 msedge.exe 81 PID 4556 wrote to memory of 5000 4556 msedge.exe 81 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4672 4556 msedge.exe 85 PID 4556 wrote to memory of 4964 4556 msedge.exe 86 PID 4556 wrote to memory of 4964 4556 msedge.exe 86 PID 4556 wrote to memory of 4320 4556 msedge.exe 87 PID 4556 wrote to memory of 4320 4556 msedge.exe 87 PID 4556 wrote to memory of 4320 4556 msedge.exe 87 PID 4556 wrote to memory of 4320 4556 msedge.exe 87 PID 4556 wrote to memory of 4320 4556 msedge.exe 87 PID 4556 wrote to memory of 4320 4556 msedge.exe 87 PID 4556 wrote to memory of 4320 4556 msedge.exe 87 PID 4556 wrote to memory of 4320 4556 msedge.exe 87 PID 4556 wrote to memory of 4320 4556 msedge.exe 87 PID 4556 wrote to memory of 4320 4556 msedge.exe 87 PID 4556 wrote to memory of 4320 4556 msedge.exe 87 PID 4556 wrote to memory of 4320 4556 msedge.exe 87 PID 4556 wrote to memory of 4320 4556 msedge.exe 87 PID 4556 wrote to memory of 4320 4556 msedge.exe 87 PID 4556 wrote to memory of 4320 4556 msedge.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe"C:\Users\Admin\AppData\Local\Temp\bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe"1⤵
- Checks computer location settings
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe"C:\Users\Admin\AppData\Local\Temp\copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe" C:\Users\Admin\AppData\Local\Temp\copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://jc.110160.com/ad.htm2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd7f8646f8,0x7ffd7f864708,0x7ffd7f8647183⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,675338016606285753,9463273190618451898,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:23⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,675338016606285753,9463273190618451898,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:33⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,675338016606285753,9463273190618451898,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:83⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,675338016606285753,9463273190618451898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3788 /prefetch:13⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,675338016606285753,9463273190618451898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:13⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2116,675338016606285753,9463273190618451898,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5452 /prefetch:83⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,675338016606285753,9463273190618451898,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6000 /prefetch:13⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,675338016606285753,9463273190618451898,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:13⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2116,675338016606285753,9463273190618451898,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3324 /prefetch:83⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,675338016606285753,9463273190618451898,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6560 /prefetch:83⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:896 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1bc,0x22c,0x7ff676c45460,0x7ff676c45470,0x7ff676c454804⤵PID:380
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,675338016606285753,9463273190618451898,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6560 /prefetch:83⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2116,675338016606285753,9463273190618451898,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2636 /prefetch:83⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,675338016606285753,9463273190618451898,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2516 /prefetch:23⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2116,675338016606285753,9463273190618451898,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3488 /prefetch:83⤵PID:3180
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1904
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize471B
MD5948958d5b404e3df686ce7cf4cf857e8
SHA1404732adbf9f1d941903c825f5396d17370f24cf
SHA256520cbf8ce8521e5a0202f8cfb376beaeb3239a7d461ccbb92e5ee997ed87f616
SHA5129de1b95fb376f3b1ae1e199e8b6eaf92ad48e79862e606124cdf1c5401d15f006546175a1cb6dcb2eacfd5edfd513a36d9b9b7620c06aca0d1bdfca080f49172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize430B
MD5509603895b054ac6c9ccec4ae4578c2b
SHA1a5fad7ffe34cc3e5ec9ce991695a2e7939f27d2c
SHA256dd9c3b25f744a25c3708f67eb9e403d0d464566b078e69fa2af54d7dcfcf2b09
SHA5129b07919a3d850772e242214e52f90128ef464251b4663263f447720315bf9fb286b43fee1d02e7738763ebf1d9eb66de9412fc93cb376b265ca8ce148d9c5733
-
C:\Users\Admin\AppData\Local\Temp\copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe
Filesize829KB
MD50b835d9a77cd422b7e5914c8b964e3a0
SHA13d06fecc6e7d428d23a52ac487d2f3616f38174c
SHA256bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3
SHA5125db0b80abe7f2bed42f32f96b5608228c76f53b9a2e9cb63b01bce2912bfbd82de441a9643d79da54207f8ec4386c0c0b6018020db0c375f4d556bb6458023ee
-
C:\Users\Admin\AppData\Local\Temp\copybfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3.exe
Filesize829KB
MD50b835d9a77cd422b7e5914c8b964e3a0
SHA13d06fecc6e7d428d23a52ac487d2f3616f38174c
SHA256bfdfd015cadb203cfb8d76017e040614100c322cb70791df53be2faef1aef5e3
SHA5125db0b80abe7f2bed42f32f96b5608228c76f53b9a2e9cb63b01bce2912bfbd82de441a9643d79da54207f8ec4386c0c0b6018020db0c375f4d556bb6458023ee