Analysis
-
max time kernel
187s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 12:16
Static task
static1
Behavioral task
behavioral1
Sample
16569fa141629436ee4db0a0638743c38c1526501d01bdc5fd62a0eed9eccebf.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
16569fa141629436ee4db0a0638743c38c1526501d01bdc5fd62a0eed9eccebf.exe
Resource
win10v2004-20221111-en
General
-
Target
16569fa141629436ee4db0a0638743c38c1526501d01bdc5fd62a0eed9eccebf.exe
-
Size
1.3MB
-
MD5
760c13b6eec6e62028474cf7f4a25efc
-
SHA1
3f3edf5b4e4f9ff7bb2ea91a9cc615e0b92b7b87
-
SHA256
16569fa141629436ee4db0a0638743c38c1526501d01bdc5fd62a0eed9eccebf
-
SHA512
87246168449b7c16b5d11fc29207aeaced1309e25bae7875770833ac2d07a3efac82b2c69f1c72c78ed67b6771ea0c30154a4887b84dc0021221bcf32e6b67e9
-
SSDEEP
24576:yvJFrKIyKPgj7YdURbY4dS1Z/HU8KiQJENWti8QlVKNyaRF4dRvAw:1IPPC7yURBS1Z/08VQicti8R8d
Malware Config
Signatures
-
Detected phishing page
-
Executes dropped EXE 3 IoCs
Processes:
chrom.exePRO77.exe24-9-pb.exepid process 3412 chrom.exe 1180 PRO77.exe 2908 24-9-pb.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
16569fa141629436ee4db0a0638743c38c1526501d01bdc5fd62a0eed9eccebf.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 16569fa141629436ee4db0a0638743c38c1526501d01bdc5fd62a0eed9eccebf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Processes:
PRO77.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4 PRO77.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 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 PRO77.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 3464 msedge.exe 3464 msedge.exe 3036 msedge.exe 3036 msedge.exe 2080 msedge.exe 2080 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
Processes:
msedge.exepid process 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrom.exePRO77.exedescription pid process Token: SeDebugPrivilege 3412 chrom.exe Token: SeDebugPrivilege 1180 PRO77.exe Token: 33 1180 PRO77.exe Token: SeIncBasePriorityPrivilege 1180 PRO77.exe Token: 33 3412 chrom.exe Token: SeIncBasePriorityPrivilege 3412 chrom.exe Token: 33 3412 chrom.exe Token: SeIncBasePriorityPrivilege 3412 chrom.exe Token: 33 1180 PRO77.exe Token: SeIncBasePriorityPrivilege 1180 PRO77.exe Token: 33 3412 chrom.exe Token: SeIncBasePriorityPrivilege 3412 chrom.exe Token: 33 3412 chrom.exe Token: SeIncBasePriorityPrivilege 3412 chrom.exe Token: 33 1180 PRO77.exe Token: SeIncBasePriorityPrivilege 1180 PRO77.exe Token: 33 1180 PRO77.exe Token: SeIncBasePriorityPrivilege 1180 PRO77.exe Token: 33 3412 chrom.exe Token: SeIncBasePriorityPrivilege 3412 chrom.exe Token: 33 3412 chrom.exe Token: SeIncBasePriorityPrivilege 3412 chrom.exe Token: 33 1180 PRO77.exe Token: SeIncBasePriorityPrivilege 1180 PRO77.exe Token: 33 1180 PRO77.exe Token: SeIncBasePriorityPrivilege 1180 PRO77.exe Token: 33 3412 chrom.exe Token: SeIncBasePriorityPrivilege 3412 chrom.exe Token: 33 3412 chrom.exe Token: SeIncBasePriorityPrivilege 3412 chrom.exe Token: 33 1180 PRO77.exe Token: SeIncBasePriorityPrivilege 1180 PRO77.exe Token: 33 3412 chrom.exe Token: SeIncBasePriorityPrivilege 3412 chrom.exe Token: 33 1180 PRO77.exe Token: SeIncBasePriorityPrivilege 1180 PRO77.exe Token: 33 3412 chrom.exe Token: SeIncBasePriorityPrivilege 3412 chrom.exe Token: 33 1180 PRO77.exe Token: SeIncBasePriorityPrivilege 1180 PRO77.exe Token: 33 3412 chrom.exe Token: SeIncBasePriorityPrivilege 3412 chrom.exe Token: 33 1180 PRO77.exe Token: SeIncBasePriorityPrivilege 1180 PRO77.exe Token: 33 3412 chrom.exe Token: SeIncBasePriorityPrivilege 3412 chrom.exe Token: 33 1180 PRO77.exe Token: SeIncBasePriorityPrivilege 1180 PRO77.exe Token: 33 3412 chrom.exe Token: SeIncBasePriorityPrivilege 3412 chrom.exe Token: 33 1180 PRO77.exe Token: SeIncBasePriorityPrivilege 1180 PRO77.exe Token: 33 3412 chrom.exe Token: SeIncBasePriorityPrivilege 3412 chrom.exe Token: 33 1180 PRO77.exe Token: SeIncBasePriorityPrivilege 1180 PRO77.exe Token: 33 1180 PRO77.exe Token: SeIncBasePriorityPrivilege 1180 PRO77.exe Token: 33 3412 chrom.exe Token: SeIncBasePriorityPrivilege 3412 chrom.exe Token: 33 3412 chrom.exe Token: SeIncBasePriorityPrivilege 3412 chrom.exe Token: 33 1180 PRO77.exe Token: SeIncBasePriorityPrivilege 1180 PRO77.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msedge.exepid process 2080 msedge.exe 2080 msedge.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
24-9-pb.exechrom.exePRO77.exepid process 2908 24-9-pb.exe 2908 24-9-pb.exe 3412 chrom.exe 3412 chrom.exe 1180 PRO77.exe 1180 PRO77.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
16569fa141629436ee4db0a0638743c38c1526501d01bdc5fd62a0eed9eccebf.exePRO77.exechrom.exemsedge.exemsedge.exedescription pid process target process PID 5068 wrote to memory of 3412 5068 16569fa141629436ee4db0a0638743c38c1526501d01bdc5fd62a0eed9eccebf.exe chrom.exe PID 5068 wrote to memory of 3412 5068 16569fa141629436ee4db0a0638743c38c1526501d01bdc5fd62a0eed9eccebf.exe chrom.exe PID 5068 wrote to memory of 3412 5068 16569fa141629436ee4db0a0638743c38c1526501d01bdc5fd62a0eed9eccebf.exe chrom.exe PID 5068 wrote to memory of 1180 5068 16569fa141629436ee4db0a0638743c38c1526501d01bdc5fd62a0eed9eccebf.exe PRO77.exe PID 5068 wrote to memory of 1180 5068 16569fa141629436ee4db0a0638743c38c1526501d01bdc5fd62a0eed9eccebf.exe PRO77.exe PID 5068 wrote to memory of 1180 5068 16569fa141629436ee4db0a0638743c38c1526501d01bdc5fd62a0eed9eccebf.exe PRO77.exe PID 5068 wrote to memory of 2908 5068 16569fa141629436ee4db0a0638743c38c1526501d01bdc5fd62a0eed9eccebf.exe 24-9-pb.exe PID 5068 wrote to memory of 2908 5068 16569fa141629436ee4db0a0638743c38c1526501d01bdc5fd62a0eed9eccebf.exe 24-9-pb.exe PID 5068 wrote to memory of 2908 5068 16569fa141629436ee4db0a0638743c38c1526501d01bdc5fd62a0eed9eccebf.exe 24-9-pb.exe PID 1180 wrote to memory of 1728 1180 PRO77.exe msedge.exe PID 1180 wrote to memory of 1728 1180 PRO77.exe msedge.exe PID 3412 wrote to memory of 2080 3412 chrom.exe msedge.exe PID 3412 wrote to memory of 2080 3412 chrom.exe msedge.exe PID 2080 wrote to memory of 3560 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3560 2080 msedge.exe msedge.exe PID 1728 wrote to memory of 4152 1728 msedge.exe msedge.exe PID 1728 wrote to memory of 4152 1728 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3172 2080 msedge.exe msedge.exe PID 1728 wrote to memory of 1208 1728 msedge.exe msedge.exe PID 1728 wrote to memory of 1208 1728 msedge.exe msedge.exe PID 1728 wrote to memory of 1208 1728 msedge.exe msedge.exe PID 1728 wrote to memory of 1208 1728 msedge.exe msedge.exe PID 1728 wrote to memory of 1208 1728 msedge.exe msedge.exe PID 1728 wrote to memory of 1208 1728 msedge.exe msedge.exe PID 1728 wrote to memory of 1208 1728 msedge.exe msedge.exe PID 1728 wrote to memory of 1208 1728 msedge.exe msedge.exe PID 1728 wrote to memory of 1208 1728 msedge.exe msedge.exe PID 1728 wrote to memory of 1208 1728 msedge.exe msedge.exe PID 1728 wrote to memory of 1208 1728 msedge.exe msedge.exe PID 1728 wrote to memory of 1208 1728 msedge.exe msedge.exe PID 1728 wrote to memory of 1208 1728 msedge.exe msedge.exe PID 1728 wrote to memory of 1208 1728 msedge.exe msedge.exe PID 1728 wrote to memory of 1208 1728 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\16569fa141629436ee4db0a0638743c38c1526501d01bdc5fd62a0eed9eccebf.exe"C:\Users\Admin\AppData\Local\Temp\16569fa141629436ee4db0a0638743c38c1526501d01bdc5fd62a0eed9eccebf.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\chrom.exe"C:\Users\Admin\AppData\Local\Temp\chrom.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://probot99.blogspot.com/3⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb5def46f8,0x7ffb5def4708,0x7ffb5def47184⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,16790548058075515597,11857124366708149518,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:24⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1844,16790548058075515597,11857124366708149518,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2428 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1844,16790548058075515597,11857124366708149518,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3184 /prefetch:84⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,16790548058075515597,11857124366708149518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3828 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,16790548058075515597,11857124366708149518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3848 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1844,16790548058075515597,11857124366708149518,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5288 /prefetch:84⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,16790548058075515597,11857124366708149518,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,16790548058075515597,11857124366708149518,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1844,16790548058075515597,11857124366708149518,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3976 /prefetch:84⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,16790548058075515597,11857124366708149518,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3768 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,16790548058075515597,11857124366708149518,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6220 /prefetch:24⤵
-
C:\Users\Admin\AppData\Local\Temp\PRO77.exe"C:\Users\Admin\AppData\Local\Temp\PRO77.exe"2⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://pro-77.blogspot.com/3⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb5def46f8,0x7ffb5def4708,0x7ffb5def47184⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,16334166350391886590,12182529417452734518,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:24⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,16334166350391886590,12182529417452734518,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,16334166350391886590,12182529417452734518,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2620 /prefetch:84⤵
-
C:\Users\Admin\AppData\Local\Temp\24-9-pb.exe"C:\Users\Admin\AppData\Local\Temp\24-9-pb.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
1KB
MD530a12f9098c0796872776d2f69e3c2e6
SHA1cd4f88c171ee7135efcc3f8d4aaef62f8d2fccbe
SHA2564abe4a49d8942023c37a21d289f1ddffd892b822419eb8707d5fcf0d99c7687b
SHA512ad1c1a2f0cba7ed02a810927c8a55db57a09c58dc0b940bbb4b28d45c8648871bc79356e3f44e9d9fb1bc39e92095f02d0ed8d2bcb31e989132a86a12b311aa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAFilesize
724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_90051C1CA1CFD5F243617D4BD45AADB6Filesize
472B
MD501f789642d92b84211d7a9391f4e55af
SHA1bfcdc40fa2e82882051aa26c61d81ffd98371506
SHA25666e2ca388a8696e08f992e3d34fe75dcccd99a0743605f3bf5e6c1c893750f24
SHA512d80e60aab562d4932bce935d01eed5de977567bda383580e6663d0f631b15aa5d7c76c1a01fd37e1d3c08ee779eecc53493d40d62cbe8b5278583a3dd4fdd133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
410B
MD5f271a81bfd916461fa1e5ce312298d07
SHA1e87dc13e823151e4ddea108a3cd9fc28bbd409ad
SHA2561c722c26b250e4d844253655d590784f0c8c187d11eb856474582540fb9d1772
SHA51232ccb3e0c5af6cdc71a68adb36d6c6b6bd1cec4ffda1ba36c22425504714a10ffa367b1594d28026bf46dfde5f998e9c7cfd379a358818c969cc7583efb40758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAFilesize
392B
MD5dc09008a02bbf6f65c5fa6ae5f3c8333
SHA1ddaf0717e4fded197a3a920576c4f9e02f20ea2c
SHA256c57c18cc38a2e2d59924846cfc7b8e98ae3cedbf384c8b987e0a36fccbe242fa
SHA512e8905b3ee180bcbd0d5e5aa3521dbeaf9f42e6e13403196e99f83f8a911b8ed7c6534ce2e4117c0f486b8f5f6606bb739136d016764c10f03c715301e9b08646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_90051C1CA1CFD5F243617D4BD45AADB6Filesize
406B
MD549eaa4193a6a8a860f2fe829e0663939
SHA13515a516142d5b9d617cde8c7a49e9bde2d9f9e1
SHA256df658a12f9ba78d09076cb8b167d6d2900b5f287718b6f8064f990db99b5f978
SHA51284e9a2cf996482ab0d0d14bb082fe63a640e0b7a3d7f6b3d01aa790b5deeadd99e4a2a063532ee93c86b731f5d42bb816eecad0977c4df56cf66c205e48740de
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5d492567d4611438b2f936ddcaa9544ef
SHA1ae88af380bbeb5e05a0446163a5434d70710f853
SHA2560cba2ccfcfff09f076de767bf8df52485a8ac4b29cd3d14d53b23fdad2da3645
SHA512150794b8598594ac00f827996e62d84b9331f1e35386e908485181204e823e8e5802fa543b53aca4d3046d176eaf4ee1dcb4df211589ea2fedac46170f162f48
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5d492567d4611438b2f936ddcaa9544ef
SHA1ae88af380bbeb5e05a0446163a5434d70710f853
SHA2560cba2ccfcfff09f076de767bf8df52485a8ac4b29cd3d14d53b23fdad2da3645
SHA512150794b8598594ac00f827996e62d84b9331f1e35386e908485181204e823e8e5802fa543b53aca4d3046d176eaf4ee1dcb4df211589ea2fedac46170f162f48
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD518ad3a99cbd5ddc6b806e98374137f92
SHA103b6e4402a81fc0585430539a6d4a208b6ca9020
SHA256b4f8afdb8ec7975ab4f4bff3a5c1fcab389dee2b9eb38b9603099d500457145f
SHA512faabf3e957ee6516f8e66a1decfb2279e3923f63d0bc3f4f6aa5082b84feba57e48d0c631800b962567313b26d6cb92192a29eef6faf7b0be01894233b4929b0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOGFilesize
347B
MD51b46a2cc275f5d026727179407a8965d
SHA11b372378f5b21fa415b59ffa94ee015d9a10f2c9
SHA2564cb9bb6113f8bfe491213be9d08cffb8a2ed7f3c83fbd44282938b71f8fa031d
SHA512d3c3e704102ae6879ebc927f42d410db214621cce987faea9155da14c96c0cb36da136a62c28a4d9c5de0638dd36430f1f06c5bc9c69ad399b6becd65706487c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOGFilesize
326B
MD5778ab17cd0c4256357cb7b2fa486a65f
SHA12a20bf53e0f56c269cf138ae4f24333fc764275e
SHA256e23a0c35346e3df8103f1f9ca5fa532c2756bcc8b846d6c613cc78f2fd83b6fb
SHA512eff9f415b25da068b8877efd93d2c3a44c5462f461caa1fc2fc142b4c71a059176df3e711a397768de7985a2bd55e3c761f2d61c3746efb0cee42407a872cfcd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Last VersionFilesize
11B
MD5838a7b32aefb618130392bc7d006aa2e
SHA15159e0f18c9e68f0e75e2239875aa994847b8290
SHA256ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa
SHA5129e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9
-
C:\Users\Admin\AppData\Local\Temp\24-9-pb.exeFilesize
1.1MB
MD581db41b6d283be9b645fbc42ea98d80d
SHA149cff3c1895e52006daa5cb93f260ad48242e1df
SHA256602465f74fbdc5baeaa9d1fbb5c660d199202052254d16003d5f8a1393be477f
SHA512a0851d145177876190e5f8e00b149b14d8f460ec954cf24b9d30beb33d7318d5552d9c34121a44703f54c2a94e4602b2594d206cbda761d24f1d5820b8bb4177
-
C:\Users\Admin\AppData\Local\Temp\24-9-pb.exeFilesize
1.1MB
MD581db41b6d283be9b645fbc42ea98d80d
SHA149cff3c1895e52006daa5cb93f260ad48242e1df
SHA256602465f74fbdc5baeaa9d1fbb5c660d199202052254d16003d5f8a1393be477f
SHA512a0851d145177876190e5f8e00b149b14d8f460ec954cf24b9d30beb33d7318d5552d9c34121a44703f54c2a94e4602b2594d206cbda761d24f1d5820b8bb4177
-
C:\Users\Admin\AppData\Local\Temp\PRO77.exeFilesize
50KB
MD50036e63e66c0705ce37ebd02018ed9d4
SHA15ea5f38f688a38a841397470851debb35b23e87c
SHA25610d7bba8a31b13550e52ae02aec7df982da228eb0e3e1b39846d50958b84ad6f
SHA512296363b3196d18e0202fe19f0752ecde882aa39f897a78bb7fe40da18d3d6534e5c105a7763365538f41a8a512138a529e2ff54b5a4353c21037d3ecfd2ee03f
-
C:\Users\Admin\AppData\Local\Temp\PRO77.exeFilesize
50KB
MD50036e63e66c0705ce37ebd02018ed9d4
SHA15ea5f38f688a38a841397470851debb35b23e87c
SHA25610d7bba8a31b13550e52ae02aec7df982da228eb0e3e1b39846d50958b84ad6f
SHA512296363b3196d18e0202fe19f0752ecde882aa39f897a78bb7fe40da18d3d6534e5c105a7763365538f41a8a512138a529e2ff54b5a4353c21037d3ecfd2ee03f
-
C:\Users\Admin\AppData\Local\Temp\chrom.exeFilesize
36KB
MD5787951fba9d217fb79320703377e0bbb
SHA1543def981079d44df0bc4c121c27d63c78bed4d8
SHA256aa2ed050a67457a7d4ff3e6855ccfc1276e66ae8b3265a31eb8cb11d03b8e699
SHA5120d798073f1c15208424751d423532a7a28603031464c739fb33baaf77d233694b3519c8ebbe82ea16cf5c64c54e1095322674bf464cc6b51f264d58c8eec3a47
-
C:\Users\Admin\AppData\Local\Temp\chrom.exeFilesize
36KB
MD5787951fba9d217fb79320703377e0bbb
SHA1543def981079d44df0bc4c121c27d63c78bed4d8
SHA256aa2ed050a67457a7d4ff3e6855ccfc1276e66ae8b3265a31eb8cb11d03b8e699
SHA5120d798073f1c15208424751d423532a7a28603031464c739fb33baaf77d233694b3519c8ebbe82ea16cf5c64c54e1095322674bf464cc6b51f264d58c8eec3a47
-
\??\pipe\LOCAL\crashpad_1728_LTJORVMUOJYLEEZBMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\LOCAL\crashpad_2080_MWVILCOQSWFMHHAFMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/1180-211-0x0000000007DF1000-0x0000000007DF8000-memory.dmpFilesize
28KB
-
memory/1180-135-0x0000000000000000-mapping.dmp
-
memory/1180-190-0x0000000007DF4000-0x0000000007DF7000-memory.dmpFilesize
12KB
-
memory/1180-193-0x0000000007DF7000-0x0000000007DFA000-memory.dmpFilesize
12KB
-
memory/1180-145-0x0000000005750000-0x00000000057E2000-memory.dmpFilesize
584KB
-
memory/1180-194-0x0000000007DF4000-0x0000000007DF7000-memory.dmpFilesize
12KB
-
memory/1180-199-0x0000000007DF1000-0x0000000007DF8000-memory.dmpFilesize
28KB
-
memory/1180-150-0x000000000BC90000-0x000000000C436000-memory.dmpFilesize
7.6MB
-
memory/1180-174-0x0000000007DF0000-0x0000000007DF4000-memory.dmpFilesize
16KB
-
memory/1180-195-0x0000000007DFA000-0x0000000007DFF000-memory.dmpFilesize
20KB
-
memory/1180-141-0x0000000000D80000-0x0000000000D92000-memory.dmpFilesize
72KB
-
memory/1180-172-0x0000000002F1A000-0x0000000002F1F000-memory.dmpFilesize
20KB
-
memory/1180-168-0x0000000002F1A000-0x0000000002F1F000-memory.dmpFilesize
20KB
-
memory/1180-197-0x0000000007DFA000-0x0000000007DFF000-memory.dmpFilesize
20KB
-
memory/1180-170-0x0000000007DF0000-0x0000000007DF4000-memory.dmpFilesize
16KB
-
memory/1180-196-0x0000000007DF7000-0x0000000007DFA000-memory.dmpFilesize
12KB
-
memory/1208-160-0x0000000000000000-mapping.dmp
-
memory/1464-179-0x0000000000000000-mapping.dmp
-
memory/1668-218-0x0000000000000000-mapping.dmp
-
memory/1728-148-0x0000000000000000-mapping.dmp
-
memory/1824-185-0x0000000000000000-mapping.dmp
-
memory/2080-149-0x0000000000000000-mapping.dmp
-
memory/2128-192-0x0000000000000000-mapping.dmp
-
memory/2840-181-0x0000000000000000-mapping.dmp
-
memory/2896-167-0x0000000000000000-mapping.dmp
-
memory/2908-138-0x0000000000000000-mapping.dmp
-
memory/3036-163-0x0000000000000000-mapping.dmp
-
memory/3172-159-0x0000000000000000-mapping.dmp
-
memory/3192-187-0x0000000000000000-mapping.dmp
-
memory/3412-198-0x0000000009DE4000-0x0000000009DE7000-memory.dmpFilesize
12KB
-
memory/3412-212-0x0000000009DE7000-0x0000000009DEA000-memory.dmpFilesize
12KB
-
memory/3412-219-0x0000000005107000-0x000000000510E000-memory.dmpFilesize
28KB
-
memory/3412-173-0x0000000009DE0000-0x0000000009DE4000-memory.dmpFilesize
16KB
-
memory/3412-171-0x000000000510A000-0x000000000510F000-memory.dmpFilesize
20KB
-
memory/3412-169-0x0000000009DE0000-0x0000000009DE4000-memory.dmpFilesize
16KB
-
memory/3412-132-0x0000000000000000-mapping.dmp
-
memory/3412-142-0x0000000000520000-0x000000000052E000-memory.dmpFilesize
56KB
-
memory/3412-200-0x0000000009DE7000-0x0000000009DEA000-memory.dmpFilesize
12KB
-
memory/3412-161-0x000000000510A000-0x000000000510F000-memory.dmpFilesize
20KB
-
memory/3412-217-0x0000000009DF5000-0x0000000009DF8000-memory.dmpFilesize
12KB
-
memory/3412-216-0x0000000009DEF000-0x0000000009DF4000-memory.dmpFilesize
20KB
-
memory/3412-147-0x0000000005200000-0x0000000005256000-memory.dmpFilesize
344KB
-
memory/3412-146-0x0000000004EE0000-0x0000000004EEA000-memory.dmpFilesize
40KB
-
memory/3412-144-0x00000000056C0000-0x0000000005C64000-memory.dmpFilesize
5.6MB
-
memory/3412-215-0x0000000009DF4000-0x0000000009DF9000-memory.dmpFilesize
20KB
-
memory/3412-209-0x0000000009DE4000-0x0000000009DE7000-memory.dmpFilesize
12KB
-
memory/3412-210-0x0000000009DEA000-0x0000000009DEF000-memory.dmpFilesize
20KB
-
memory/3412-143-0x0000000004F20000-0x0000000004FBC000-memory.dmpFilesize
624KB
-
memory/3412-214-0x0000000009DEF000-0x0000000009DF4000-memory.dmpFilesize
20KB
-
memory/3412-213-0x0000000009DEA000-0x0000000009DEF000-memory.dmpFilesize
20KB
-
memory/3464-162-0x0000000000000000-mapping.dmp
-
memory/3560-151-0x0000000000000000-mapping.dmp
-
memory/4152-152-0x0000000000000000-mapping.dmp
-
memory/4388-183-0x0000000000000000-mapping.dmp
-
memory/4492-189-0x0000000000000000-mapping.dmp
-
memory/4540-208-0x0000000000000000-mapping.dmp