Analysis
-
max time kernel
171s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 21:51
Behavioral task
behavioral1
Sample
落寞天空之舞辅助v1.4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
落寞天空之舞辅助v1.4.exe
Resource
win10v2004-20220812-en
General
-
Target
落寞天空之舞辅助v1.4.exe
-
Size
1.2MB
-
MD5
8e8ecc3a41b959eac06b97016e0ce363
-
SHA1
c3b8e153f250c339aef7e4683a2992738f45e8d8
-
SHA256
71e9c1a51ee7e920b39ee3a2dd3aedf5c57822ed43d2ef3bdc37f15953e6f4a3
-
SHA512
7dd786ab69cdcad92dc70f5759fa7183f5b61fe253b9e46ff4fdbd9a1e6d4b3ed1f2e95018c533251bc54fcb1650e55ed94b755db065fad11ca99b6d38d77c89
-
SSDEEP
24576:JaWrjrTzPNQTIrdhCvCgLLM4YqaR19zb/C03eX70Mxddy:gWrjLPNYcC5ENqalzb603c4Idd
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\jedata.dll acprotect -
Processes:
resource yara_rule behavioral2/memory/2708-132-0x0000000000400000-0x0000000000C01000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\jedata.dll upx behavioral2/memory/2708-134-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2708-140-0x0000000000400000-0x0000000000C01000-memory.dmp upx -
Loads dropped DLL 1 IoCs
Processes:
落寞天空之舞辅助v1.4.exepid process 2708 落寞天空之舞辅助v1.4.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
Processes:
setup.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221126084944.pma setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\43c044ca-cfdd-417d-85a1-ae41cb2dc40e.tmp setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
msedge.exemsedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1392 msedge.exe 1392 msedge.exe 3280 msedge.exe 3280 msedge.exe 2040 msedge.exe 2040 msedge.exe 4036 identity_helper.exe 4036 identity_helper.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
msedge.exepid process 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
落寞天空之舞辅助v1.4.exepid process 2708 落寞天空之舞辅助v1.4.exe 2708 落寞天空之舞辅助v1.4.exe 2708 落寞天空之舞辅助v1.4.exe 2708 落寞天空之舞辅助v1.4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
落寞天空之舞辅助v1.4.exemsedge.exemsedge.exedescription pid process target process PID 2708 wrote to memory of 2040 2708 落寞天空之舞辅助v1.4.exe msedge.exe PID 2708 wrote to memory of 2040 2708 落寞天空之舞辅助v1.4.exe msedge.exe PID 2040 wrote to memory of 5016 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 5016 2040 msedge.exe msedge.exe PID 2708 wrote to memory of 3900 2708 落寞天空之舞辅助v1.4.exe msedge.exe PID 2708 wrote to memory of 3900 2708 落寞天空之舞辅助v1.4.exe msedge.exe PID 3900 wrote to memory of 4228 3900 msedge.exe msedge.exe PID 3900 wrote to memory of 4228 3900 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 2040 wrote to memory of 764 2040 msedge.exe msedge.exe PID 3900 wrote to memory of 1884 3900 msedge.exe msedge.exe PID 3900 wrote to memory of 1884 3900 msedge.exe msedge.exe PID 3900 wrote to memory of 1884 3900 msedge.exe msedge.exe PID 3900 wrote to memory of 1884 3900 msedge.exe msedge.exe PID 3900 wrote to memory of 1884 3900 msedge.exe msedge.exe PID 3900 wrote to memory of 1884 3900 msedge.exe msedge.exe PID 3900 wrote to memory of 1884 3900 msedge.exe msedge.exe PID 3900 wrote to memory of 1884 3900 msedge.exe msedge.exe PID 3900 wrote to memory of 1884 3900 msedge.exe msedge.exe PID 3900 wrote to memory of 1884 3900 msedge.exe msedge.exe PID 3900 wrote to memory of 1884 3900 msedge.exe msedge.exe PID 3900 wrote to memory of 1884 3900 msedge.exe msedge.exe PID 3900 wrote to memory of 1884 3900 msedge.exe msedge.exe PID 3900 wrote to memory of 1884 3900 msedge.exe msedge.exe PID 3900 wrote to memory of 1884 3900 msedge.exe msedge.exe PID 3900 wrote to memory of 1884 3900 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\落寞天空之舞辅助v1.4.exe"C:\Users\Admin\AppData\Local\Temp\落寞天空之舞辅助v1.4.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.luomowg.com/a/case/2014/0710/20.html2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff3e1a46f8,0x7fff3e1a4708,0x7fff3e1a47183⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,9427558408344807553,11314462508260847569,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,9427558408344807553,11314462508260847569,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:23⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,9427558408344807553,11314462508260847569,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 /prefetch:83⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9427558408344807553,11314462508260847569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:13⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9427558408344807553,11314462508260847569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:13⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9427558408344807553,11314462508260847569,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3904 /prefetch:13⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2136,9427558408344807553,11314462508260847569,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4896 /prefetch:83⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9427558408344807553,11314462508260847569,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:13⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9427558408344807553,11314462508260847569,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:13⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2136,9427558408344807553,11314462508260847569,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5800 /prefetch:83⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9427558408344807553,11314462508260847569,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6604 /prefetch:13⤵PID:616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,9427558408344807553,11314462508260847569,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6824 /prefetch:83⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:380 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x254,0x258,0x25c,0x230,0x260,0x7ff7918f5460,0x7ff7918f5470,0x7ff7918f54804⤵PID:2064
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,9427558408344807553,11314462508260847569,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6824 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2136,9427558408344807553,11314462508260847569,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6444 /prefetch:83⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2136,9427558408344807553,11314462508260847569,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4964 /prefetch:83⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,9427558408344807553,11314462508260847569,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1892 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4828
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.qingqingwg.com/2⤵
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff3e1a46f8,0x7fff3e1a4708,0x7fff3e1a47183⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,13639714188726024966,12914458391829800263,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:23⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,13639714188726024966,12914458391829800263,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3280
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4952
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1472
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE
Filesize471B
MD5e49d3b6d31969649658a797adcbdb79e
SHA1af5021b523c38ad0285023671e53f433ad606c2e
SHA25623091154c783ca5022389f11e951b6e04dc9d2d2746a7f696e25137fcd8766d1
SHA512fe88191580d85400a7bc919e9480e24b64542729a5070c978a96df45ba8ca00dee630ca13d67eb95a51ae71808e9e7be30ba1851fb59c972b471f288715b665c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE
Filesize416B
MD516131ddf02c786474dbd2c4914b945a2
SHA18ad66a3a3bed7118452eebbc4aa36168075d63d0
SHA256ec2d85ef81e7a81d7e1f2bf86f822d62e7dc3af4071f14aa1301ea2a34d013c6
SHA512a75fea2bf98e32e2c00ea8bb60a38ff86c84fb4910cb5c21ba68d8d2c4b5258fd3ac62780ff1a514407e019b2c6ca35148271db8e8c639a77379cf3b27de773f
-
Filesize
152B
MD5727230d7b0f8df1633bc043529f5c15d
SHA15b24d959d4c5dcf8125125dbee37225d6160af18
SHA25654961bcb62812886877fcd3ad3896891099cc4bddc51ea6f07a606cf5124d998
SHA51235735f0dadf7ee69bcccd5e9120d6a55db39138eff58acbe4ea8116fb007c54a024028dccd5f25856ffcf33e1f3bdccfd8d0e2527130a16351debb04c27b8df9
-
Filesize
152B
MD5727230d7b0f8df1633bc043529f5c15d
SHA15b24d959d4c5dcf8125125dbee37225d6160af18
SHA25654961bcb62812886877fcd3ad3896891099cc4bddc51ea6f07a606cf5124d998
SHA51235735f0dadf7ee69bcccd5e9120d6a55db39138eff58acbe4ea8116fb007c54a024028dccd5f25856ffcf33e1f3bdccfd8d0e2527130a16351debb04c27b8df9
-
Filesize
152B
MD5727230d7b0f8df1633bc043529f5c15d
SHA15b24d959d4c5dcf8125125dbee37225d6160af18
SHA25654961bcb62812886877fcd3ad3896891099cc4bddc51ea6f07a606cf5124d998
SHA51235735f0dadf7ee69bcccd5e9120d6a55db39138eff58acbe4ea8116fb007c54a024028dccd5f25856ffcf33e1f3bdccfd8d0e2527130a16351debb04c27b8df9
-
Filesize
152B
MD5727230d7b0f8df1633bc043529f5c15d
SHA15b24d959d4c5dcf8125125dbee37225d6160af18
SHA25654961bcb62812886877fcd3ad3896891099cc4bddc51ea6f07a606cf5124d998
SHA51235735f0dadf7ee69bcccd5e9120d6a55db39138eff58acbe4ea8116fb007c54a024028dccd5f25856ffcf33e1f3bdccfd8d0e2527130a16351debb04c27b8df9
-
Filesize
152B
MD57b4b103831d353776ed8bfcc7676f9df
SHA140f33a3f791fda49a35224a469cc67b94ca53a23
SHA256bf59580e4d4a781622abb3d43674dedc8d618d6c6da09e7d85d920cd9cea4e85
SHA5125cb3360ac602d18425bdb977be3c9ee8bbe815815278a8848488ba9097e849b7d67f993b4795216e0c168cdc9c9260de504cccb305ff808da63762c2209e532f
-
Filesize
152B
MD57b4b103831d353776ed8bfcc7676f9df
SHA140f33a3f791fda49a35224a469cc67b94ca53a23
SHA256bf59580e4d4a781622abb3d43674dedc8d618d6c6da09e7d85d920cd9cea4e85
SHA5125cb3360ac602d18425bdb977be3c9ee8bbe815815278a8848488ba9097e849b7d67f993b4795216e0c168cdc9c9260de504cccb305ff808da63762c2209e532f
-
Filesize
152B
MD57b4b103831d353776ed8bfcc7676f9df
SHA140f33a3f791fda49a35224a469cc67b94ca53a23
SHA256bf59580e4d4a781622abb3d43674dedc8d618d6c6da09e7d85d920cd9cea4e85
SHA5125cb3360ac602d18425bdb977be3c9ee8bbe815815278a8848488ba9097e849b7d67f993b4795216e0c168cdc9c9260de504cccb305ff808da63762c2209e532f
-
Filesize
152B
MD57b4b103831d353776ed8bfcc7676f9df
SHA140f33a3f791fda49a35224a469cc67b94ca53a23
SHA256bf59580e4d4a781622abb3d43674dedc8d618d6c6da09e7d85d920cd9cea4e85
SHA5125cb3360ac602d18425bdb977be3c9ee8bbe815815278a8848488ba9097e849b7d67f993b4795216e0c168cdc9c9260de504cccb305ff808da63762c2209e532f
-
Filesize
2KB
MD5ced059f8e9c9107cfbb676f2c22ed503
SHA14617345ecc60ed1b12f49e136c62ae4337ad1b76
SHA2561ce565b2c9c2d621c4cbc120e077396195c1784c3a8add714353db15f2b7001e
SHA512556b923ce942f781290cd8e879ef5b6353173c2162ec2a410538376d5b4be98e649a8dd76fef1086733bc3f6e8e787c82665bab3c3b6735083fb97b27c5a17d6
-
Filesize
86KB
MD5114054313070472cd1a6d7d28f7c5002
SHA19a044986e6101df1a126035da7326a50c3fe9a23
SHA256e15d9e1b772fed3db19e67b8d54533d1a2d46a37f8b12702a5892c6b886e9db1
SHA512a2ff8481e89698dae4a1c83404105093472e384d7a3debbd7014e010543e08efc8ebb3f67c8a4ce09029e6b2a8fb7779bb402aae7c9987e61389cd8a72c73522
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e