Analysis
-
max time kernel
152s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 08:10
Static task
static1
Behavioral task
behavioral1
Sample
35424f2a7588880cd318c667729b0217fa8ae592accef251b9713a396ed653a2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
35424f2a7588880cd318c667729b0217fa8ae592accef251b9713a396ed653a2.exe
Resource
win10v2004-20221111-en
General
-
Target
35424f2a7588880cd318c667729b0217fa8ae592accef251b9713a396ed653a2.exe
-
Size
935KB
-
MD5
499f9f1ef96f7ceaff8822a219e2d721
-
SHA1
a653e05a45f9f47651af89e34b1f856dbde82820
-
SHA256
35424f2a7588880cd318c667729b0217fa8ae592accef251b9713a396ed653a2
-
SHA512
d0e1aab02508455afb453feb0e9e940d107951e4de30a27c00b12c188d0446b34adf985310822e46d6a5b625930881cc7750c66876e96d30f818ffd3c098e5f5
-
SSDEEP
12288:ELnhM2vZsZ2NDSgB/ZVL5WxewJB6LOgPe2ubegiUAyNiRnj17+o7QLZrvXxNcs:E6WZsgVSqxVLEewn6PPSribR7+hNTXB
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4796 csrssv.exe 3184 DCN_PRO_FREE_5_11_2557.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 35424f2a7588880cd318c667729b0217fa8ae592accef251b9713a396ed653a2.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\botweb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\csrssv.exe" csrssv.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\030e9e50-51ad-4ab8-b450-495fc0b56e4d.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221124130054.pma setup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 940 4796 WerFault.exe 84 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Kills process with taskkill 2 IoCs
pid Process 1792 taskkill.exe 1784 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4796 csrssv.exe 4796 csrssv.exe 4796 csrssv.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 4336 msedge.exe 4336 msedge.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 4732 msedge.exe 4732 msedge.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe 3184 DCN_PRO_FREE_5_11_2557.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
pid Process 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1784 taskkill.exe Token: SeDebugPrivilege 1792 taskkill.exe Token: SeDebugPrivilege 4796 csrssv.exe Token: SeRestorePrivilege 2592 dw20.exe Token: SeBackupPrivilege 2592 dw20.exe Token: SeBackupPrivilege 2592 dw20.exe Token: SeBackupPrivilege 2592 dw20.exe Token: SeBackupPrivilege 2592 dw20.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3184 DCN_PRO_FREE_5_11_2557.exe 4796 csrssv.exe 4796 csrssv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4072 wrote to memory of 4796 4072 35424f2a7588880cd318c667729b0217fa8ae592accef251b9713a396ed653a2.exe 84 PID 4072 wrote to memory of 4796 4072 35424f2a7588880cd318c667729b0217fa8ae592accef251b9713a396ed653a2.exe 84 PID 4072 wrote to memory of 4796 4072 35424f2a7588880cd318c667729b0217fa8ae592accef251b9713a396ed653a2.exe 84 PID 4072 wrote to memory of 3184 4072 35424f2a7588880cd318c667729b0217fa8ae592accef251b9713a396ed653a2.exe 85 PID 4072 wrote to memory of 3184 4072 35424f2a7588880cd318c667729b0217fa8ae592accef251b9713a396ed653a2.exe 85 PID 4072 wrote to memory of 3184 4072 35424f2a7588880cd318c667729b0217fa8ae592accef251b9713a396ed653a2.exe 85 PID 3184 wrote to memory of 1792 3184 DCN_PRO_FREE_5_11_2557.exe 86 PID 3184 wrote to memory of 1792 3184 DCN_PRO_FREE_5_11_2557.exe 86 PID 3184 wrote to memory of 1792 3184 DCN_PRO_FREE_5_11_2557.exe 86 PID 3184 wrote to memory of 1784 3184 DCN_PRO_FREE_5_11_2557.exe 88 PID 3184 wrote to memory of 1784 3184 DCN_PRO_FREE_5_11_2557.exe 88 PID 3184 wrote to memory of 1784 3184 DCN_PRO_FREE_5_11_2557.exe 88 PID 3184 wrote to memory of 4732 3184 DCN_PRO_FREE_5_11_2557.exe 90 PID 3184 wrote to memory of 4732 3184 DCN_PRO_FREE_5_11_2557.exe 90 PID 4732 wrote to memory of 3540 4732 msedge.exe 92 PID 4732 wrote to memory of 3540 4732 msedge.exe 92 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 672 4732 msedge.exe 94 PID 4732 wrote to memory of 4336 4732 msedge.exe 95 PID 4732 wrote to memory of 4336 4732 msedge.exe 95 PID 4732 wrote to memory of 2884 4732 msedge.exe 96 PID 4732 wrote to memory of 2884 4732 msedge.exe 96 PID 4732 wrote to memory of 2884 4732 msedge.exe 96 PID 4732 wrote to memory of 2884 4732 msedge.exe 96 PID 4732 wrote to memory of 2884 4732 msedge.exe 96 PID 4732 wrote to memory of 2884 4732 msedge.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\35424f2a7588880cd318c667729b0217fa8ae592accef251b9713a396ed653a2.exe"C:\Users\Admin\AppData\Local\Temp\35424f2a7588880cd318c667729b0217fa8ae592accef251b9713a396ed653a2.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\csrssv.exe"C:\Users\Admin\AppData\Local\Temp\csrssv.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4796 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 23323⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 23723⤵
- Program crash
PID:940
-
-
-
C:\Users\Admin\AppData\Local\Temp\DCN_PRO_FREE_5_11_2557.exe"C:\Users\Admin\AppData\Local\Temp\DCN_PRO_FREE_5_11_2557.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /t /im PointBlank.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /t /im HSUpdate.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://dcn-mode.blogspot.com/3⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff9d48f46f8,0x7ff9d48f4708,0x7ff9d48f47184⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1468,7389839060563805805,6337056532260106996,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:24⤵PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1468,7389839060563805805,6337056532260106996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1468,7389839060563805805,6337056532260106996,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:84⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1468,7389839060563805805,6337056532260106996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:14⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1468,7389839060563805805,6337056532260106996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:14⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1468,7389839060563805805,6337056532260106996,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:14⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1468,7389839060563805805,6337056532260106996,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3740 /prefetch:14⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1468,7389839060563805805,6337056532260106996,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:14⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1468,7389839060563805805,6337056532260106996,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6160 /prefetch:14⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1468,7389839060563805805,6337056532260106996,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6260 /prefetch:14⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1468,7389839060563805805,6337056532260106996,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6276 /prefetch:14⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1468,7389839060563805805,6337056532260106996,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:14⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1468,7389839060563805805,6337056532260106996,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7004 /prefetch:14⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1468,7389839060563805805,6337056532260106996,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7068 /prefetch:14⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1468,7389839060563805805,6337056532260106996,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6508 /prefetch:14⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1468,7389839060563805805,6337056532260106996,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7688 /prefetch:14⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1468,7389839060563805805,6337056532260106996,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6656 /prefetch:14⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1468,7389839060563805805,6337056532260106996,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7780 /prefetch:14⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1468,7389839060563805805,6337056532260106996,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7384 /prefetch:14⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1468,7389839060563805805,6337056532260106996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4740 /prefetch:84⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings4⤵
- Drops file in Program Files directory
PID:1684 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1c4,0x22c,0x7ff78e055460,0x7ff78e055470,0x7ff78e0554805⤵PID:3444
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1468,7389839060563805805,6337056532260106996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4740 /prefetch:84⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1468,7389839060563805805,6337056532260106996,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:84⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1468,7389839060563805805,6337056532260106996,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5536 /prefetch:24⤵PID:4772
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4796 -ip 47961⤵PID:3068
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
928KB
MD50eaadd57af672c96ef783e2cdde33e22
SHA194976680286acc8e2ef58aae4a48571ea99401c4
SHA25669d39b50c4097abd42873137fe44da9b3302495ab9dfab4862e6b4aafb7e7204
SHA51285c9f67daac5b087bbc4e91adc6a40a20467d528c3a768dcd43aff395eebe5e1f4c9f1ff24b041ce7a2acbd8fb7c8faca077a7b17b5018a60a24829d53071d31
-
Filesize
928KB
MD50eaadd57af672c96ef783e2cdde33e22
SHA194976680286acc8e2ef58aae4a48571ea99401c4
SHA25669d39b50c4097abd42873137fe44da9b3302495ab9dfab4862e6b4aafb7e7204
SHA51285c9f67daac5b087bbc4e91adc6a40a20467d528c3a768dcd43aff395eebe5e1f4c9f1ff24b041ce7a2acbd8fb7c8faca077a7b17b5018a60a24829d53071d31
-
Filesize
20KB
MD57f5831d9f3d7b1ad4965fc726a9ddf92
SHA1b60a6f053bfc9b86f26e0c8004c21cf83ccd63f5
SHA256841d7779224e9a3a96a712b040586be5928f3f1646fe6ce187a9f080a40be3a5
SHA51275dabd08271bc490553c8d0cd8a624a391cb222cbbea7df55d883f21b820fc844d89b9d18b1c39600469c4beae33da46d2c0fd095328ad7020bb9e32a478014c
-
Filesize
20KB
MD57f5831d9f3d7b1ad4965fc726a9ddf92
SHA1b60a6f053bfc9b86f26e0c8004c21cf83ccd63f5
SHA256841d7779224e9a3a96a712b040586be5928f3f1646fe6ce187a9f080a40be3a5
SHA51275dabd08271bc490553c8d0cd8a624a391cb222cbbea7df55d883f21b820fc844d89b9d18b1c39600469c4beae33da46d2c0fd095328ad7020bb9e32a478014c