Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:43
Behavioral task
behavioral1
Sample
5931586e55dea4f8f85a1767d90a8ed56afec3d04413573c85f32c2d10c14583.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5931586e55dea4f8f85a1767d90a8ed56afec3d04413573c85f32c2d10c14583.exe
Resource
win10v2004-20220812-en
General
-
Target
5931586e55dea4f8f85a1767d90a8ed56afec3d04413573c85f32c2d10c14583.exe
-
Size
2.4MB
-
MD5
b242e4b930901e8e0db343ecf54ab247
-
SHA1
3485907c13ca9327578f0699de3f4447c650606e
-
SHA256
5931586e55dea4f8f85a1767d90a8ed56afec3d04413573c85f32c2d10c14583
-
SHA512
5db51fde7cfc314ca081c5a9286c970481344460728061c637819f70f6ad19c277e4bff33704810d362c588fcb653d97aa674d1d4d1998a836fbb43b5c1d1478
-
SSDEEP
49152:xXv8RfxPn+Cy5nmyy90FJmVxpTZl6MfMf4AUf9UTKsNitrbzrdi:qRfxNy5myNYTTZU74Z6vNit/zrd
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4892-132-0x0000000000400000-0x00000000009B9000-memory.dmp vmprotect behavioral2/memory/4892-135-0x0000000000400000-0x00000000009B9000-memory.dmp vmprotect behavioral2/memory/4892-141-0x0000000000400000-0x00000000009B9000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
Processes:
setup.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221123180651.pma setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\4dd25d88-a399-41e8-a0ba-b65609cbb867.tmp setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
5931586e55dea4f8f85a1767d90a8ed56afec3d04413573c85f32c2d10c14583.exemsedge.exemsedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4892 5931586e55dea4f8f85a1767d90a8ed56afec3d04413573c85f32c2d10c14583.exe 4892 5931586e55dea4f8f85a1767d90a8ed56afec3d04413573c85f32c2d10c14583.exe 4892 5931586e55dea4f8f85a1767d90a8ed56afec3d04413573c85f32c2d10c14583.exe 4892 5931586e55dea4f8f85a1767d90a8ed56afec3d04413573c85f32c2d10c14583.exe 4892 5931586e55dea4f8f85a1767d90a8ed56afec3d04413573c85f32c2d10c14583.exe 4892 5931586e55dea4f8f85a1767d90a8ed56afec3d04413573c85f32c2d10c14583.exe 4892 5931586e55dea4f8f85a1767d90a8ed56afec3d04413573c85f32c2d10c14583.exe 4892 5931586e55dea4f8f85a1767d90a8ed56afec3d04413573c85f32c2d10c14583.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 2056 msedge.exe 2056 msedge.exe 4924 msedge.exe 4924 msedge.exe 4952 identity_helper.exe 4952 identity_helper.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msedge.exepid process 4924 msedge.exe 4924 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
5931586e55dea4f8f85a1767d90a8ed56afec3d04413573c85f32c2d10c14583.exepid process 4892 5931586e55dea4f8f85a1767d90a8ed56afec3d04413573c85f32c2d10c14583.exe 4892 5931586e55dea4f8f85a1767d90a8ed56afec3d04413573c85f32c2d10c14583.exe 4892 5931586e55dea4f8f85a1767d90a8ed56afec3d04413573c85f32c2d10c14583.exe 4892 5931586e55dea4f8f85a1767d90a8ed56afec3d04413573c85f32c2d10c14583.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5931586e55dea4f8f85a1767d90a8ed56afec3d04413573c85f32c2d10c14583.exemsedge.exemsedge.exedescription pid process target process PID 4892 wrote to memory of 1716 4892 5931586e55dea4f8f85a1767d90a8ed56afec3d04413573c85f32c2d10c14583.exe msedge.exe PID 4892 wrote to memory of 1716 4892 5931586e55dea4f8f85a1767d90a8ed56afec3d04413573c85f32c2d10c14583.exe msedge.exe PID 1716 wrote to memory of 4744 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4744 1716 msedge.exe msedge.exe PID 4892 wrote to memory of 4924 4892 5931586e55dea4f8f85a1767d90a8ed56afec3d04413573c85f32c2d10c14583.exe msedge.exe PID 4892 wrote to memory of 4924 4892 5931586e55dea4f8f85a1767d90a8ed56afec3d04413573c85f32c2d10c14583.exe msedge.exe PID 4924 wrote to memory of 4856 4924 msedge.exe msedge.exe PID 4924 wrote to memory of 4856 4924 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 4924 wrote to memory of 4340 4924 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 4924 wrote to memory of 4340 4924 msedge.exe msedge.exe PID 1716 wrote to memory of 4004 1716 msedge.exe msedge.exe PID 4924 wrote to memory of 4340 4924 msedge.exe msedge.exe PID 4924 wrote to memory of 4340 4924 msedge.exe msedge.exe PID 4924 wrote to memory of 4340 4924 msedge.exe msedge.exe PID 4924 wrote to memory of 4340 4924 msedge.exe msedge.exe PID 4924 wrote to memory of 4340 4924 msedge.exe msedge.exe PID 4924 wrote to memory of 4340 4924 msedge.exe msedge.exe PID 4924 wrote to memory of 4340 4924 msedge.exe msedge.exe PID 4924 wrote to memory of 4340 4924 msedge.exe msedge.exe PID 4924 wrote to memory of 4340 4924 msedge.exe msedge.exe PID 4924 wrote to memory of 4340 4924 msedge.exe msedge.exe PID 4924 wrote to memory of 4340 4924 msedge.exe msedge.exe PID 4924 wrote to memory of 4340 4924 msedge.exe msedge.exe PID 4924 wrote to memory of 4340 4924 msedge.exe msedge.exe PID 4924 wrote to memory of 4340 4924 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5931586e55dea4f8f85a1767d90a8ed56afec3d04413573c85f32c2d10c14583.exe"C:\Users\Admin\AppData\Local\Temp\5931586e55dea4f8f85a1767d90a8ed56afec3d04413573c85f32c2d10c14583.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.75yoyo.com/2⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffada8046f8,0x7ffada804708,0x7ffada8047183⤵PID:4744
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,18117340990189667401,12663035121804344394,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:23⤵PID:4004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,18117340990189667401,12663035121804344394,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2472 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2056 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.75yoyo.com/2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffada8046f8,0x7ffada804708,0x7ffada8047183⤵PID:4856
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,10773742488706590219,141096369884200757,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:23⤵PID:4340
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,10773742488706590219,141096369884200757,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2388 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1684 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,10773742488706590219,141096369884200757,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:83⤵PID:2276
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10773742488706590219,141096369884200757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:13⤵PID:4716
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10773742488706590219,141096369884200757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:13⤵PID:1660
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10773742488706590219,141096369884200757,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:13⤵PID:2256
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2140,10773742488706590219,141096369884200757,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5012 /prefetch:83⤵PID:2984
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10773742488706590219,141096369884200757,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:13⤵PID:5004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10773742488706590219,141096369884200757,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6264 /prefetch:13⤵PID:3860
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2140,10773742488706590219,141096369884200757,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6664 /prefetch:83⤵PID:508
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10773742488706590219,141096369884200757,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6684 /prefetch:13⤵PID:1248
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10773742488706590219,141096369884200757,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6704 /prefetch:13⤵PID:1864
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,10773742488706590219,141096369884200757,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:83⤵PID:4360
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:1984 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1bc,0x22c,0x7ff7306b5460,0x7ff7306b5470,0x7ff7306b54804⤵PID:4748
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,10773742488706590219,141096369884200757,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4952 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2140,10773742488706590219,141096369884200757,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:83⤵PID:2144
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2140,10773742488706590219,141096369884200757,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6980 /prefetch:83⤵PID:4008
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,10773742488706590219,141096369884200757,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6612 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2760
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4052
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f7dcb24540769805e5bb30d193944dce
SHA1e26c583c562293356794937d9e2e6155d15449ee
SHA2566b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea
SHA512cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE
Filesize471B
MD53440eb375c0ced7c152c865a20565dcf
SHA153e768bed9b7a9a29663806364fa406af1df70bb
SHA2561d7c8375529c9850492903c29de8e85ffda34250f032882ef3beaf147eb8c343
SHA5123a268be9068f887bafec850ad43b3b10556443ce4b23907c9ee2fc08403aa49df1480897b18b84e514aa0f62b8b796de2d0f2f4fa1006ea6b3be8de70b96c97b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
Filesize302B
MD5313ece46bf53b738a05a6fc057abf5db
SHA1276c04723d5441ac0f4f174af3ea13a83f015524
SHA25669c3324f479e6dada956b90dc2c88c49914cabf4fdf9e71c02af302f28547537
SHA51227b95a3f1dd5e78020404881e45090e47acd9a82705cd1df738cb73933182297b57fb359b468847d215774a449d516227210c614f35bacabbc1afc3b813c6644
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE
Filesize446B
MD5305e92a91400ee5d771cd51bc3034d1f
SHA1329c2b9dfdadd341620f845a89c29af72a8aafd0
SHA2567a21b51b55ba7ab8503b340fff47baef1490cba33ccab3dcc5fdddb90db2d024
SHA5124cd150c76c64e91c7e8b9e7d92b8c22eff19aa4ddd1ae6ab08b2079c2492f602807bf7f5f1a4b736539115557e5a2b1285e4a0f0816cd893140e2429c522ae1d
-
Filesize
152B
MD5727230d7b0f8df1633bc043529f5c15d
SHA15b24d959d4c5dcf8125125dbee37225d6160af18
SHA25654961bcb62812886877fcd3ad3896891099cc4bddc51ea6f07a606cf5124d998
SHA51235735f0dadf7ee69bcccd5e9120d6a55db39138eff58acbe4ea8116fb007c54a024028dccd5f25856ffcf33e1f3bdccfd8d0e2527130a16351debb04c27b8df9
-
Filesize
152B
MD57b4b103831d353776ed8bfcc7676f9df
SHA140f33a3f791fda49a35224a469cc67b94ca53a23
SHA256bf59580e4d4a781622abb3d43674dedc8d618d6c6da09e7d85d920cd9cea4e85
SHA5125cb3360ac602d18425bdb977be3c9ee8bbe815815278a8848488ba9097e849b7d67f993b4795216e0c168cdc9c9260de504cccb305ff808da63762c2209e532f
-
Filesize
152B
MD57b4b103831d353776ed8bfcc7676f9df
SHA140f33a3f791fda49a35224a469cc67b94ca53a23
SHA256bf59580e4d4a781622abb3d43674dedc8d618d6c6da09e7d85d920cd9cea4e85
SHA5125cb3360ac602d18425bdb977be3c9ee8bbe815815278a8848488ba9097e849b7d67f993b4795216e0c168cdc9c9260de504cccb305ff808da63762c2209e532f
-
Filesize
2KB
MD54990d80816e2d65e7f3ab32f276b3c24
SHA1a60e9725a0341a9ca3637e7eb94305f2bfc537fe
SHA2569162a532d43163c4541e66b9b9064525a5d496ee7e3ad7d4703a632c18f12b6d
SHA51239265c80bc9b986df8b34608162863d7ed6cf41ea7c45e2cfa6a14ce6eef833a40ffa12cd5b00ae4d868170406bcd4895368795637c5088030272b083888c484
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e