Analysis
-
max time kernel
206s -
max time network
219s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 15:20
Static task
static1
Behavioral task
behavioral1
Sample
99794aba2e898e8be53beafae36c894c91305bad6bc89b1158b977c26d0a367e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
99794aba2e898e8be53beafae36c894c91305bad6bc89b1158b977c26d0a367e.exe
Resource
win10v2004-20220812-en
General
-
Target
99794aba2e898e8be53beafae36c894c91305bad6bc89b1158b977c26d0a367e.exe
-
Size
1.9MB
-
MD5
e036f45b9e6d96b93221a3ea2a076bb1
-
SHA1
f3936b68b8ba37ad11617e24f455b2f55ccc0ac4
-
SHA256
99794aba2e898e8be53beafae36c894c91305bad6bc89b1158b977c26d0a367e
-
SHA512
b14bc56385247557deb987464ece7bd18d6e9d6ade931fe30061dd0f17fdf1a1bcbb960aa44840ed08d6187f231c82e2212c29eec1ed662aef71df594b97523e
-
SSDEEP
24576:aLrkAgWsT1WCkbzSucJA1HnQYb7y5kkWMWRkghZ66:aEAS8ZqA15TkW7W6
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 99794aba2e898e8be53beafae36c894c91305bad6bc89b1158b977c26d0a367e.exe -
Loads dropped DLL 2 IoCs
pid Process 1384 99794aba2e898e8be53beafae36c894c91305bad6bc89b1158b977c26d0a367e.exe 1384 99794aba2e898e8be53beafae36c894c91305bad6bc89b1158b977c26d0a367e.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\cfmogu.dll 99794aba2e898e8be53beafae36c894c91305bad6bc89b1158b977c26d0a367e.exe File created C:\Windows\SysWOW64\SouGou.ime 99794aba2e898e8be53beafae36c894c91305bad6bc89b1158b977c26d0a367e.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\46fdb3e9-c1f7-4e7a-9965-f3711f723772.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221201013816.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bc82b9793c99f54f886cd0ad3a72f2a1000000000200000000001066000000010000200000002e50aec5a7f070e5e8242892665448bf69d01c755814722a5f23dd5d0aa113bb000000000e8000000002000020000000641412d8e6a2fea846f015242de894c58007c361b6ed8ec0cc543124533b6443200000001ee563014a5585575479709b7ac51a2c287988bbbc407fa20d2f1e6cf15db010400000008a940351d0ef003d7e425b4b81802f68fb42989d23951da5dbcdefd425e6583e249bb6701a54c454af8cc016b31f35fb69b3257474452eb1ee908fb56bcde7ca iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2202734854" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30999845" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2202734854" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 006cfd722505d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0baae732505d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bc82b9793c99f54f886cd0ad3a72f2a100000000020000000000106600000001000020000000d850d95b6dcd639cec0d63ea47c416c20fcbb8210ee53036db5b486b6fafd973000000000e800000000200002000000044c99e803fa77763c11876c997ef01541181c3bce358f9c50792a4e0ed19baf620000000ce52bb42adb79b31e701615d4ca00534cb575d96a6b662250d31b2d4978fe85140000000f7af05d2c712f00e6341fce284bdf68a12de7cc4f56b429abfa1d2ec25e6d2219404627aeb442155ff15c1791a38f81cc8ad840a2451cdd56899fc54efccd865 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{9B3262EF-7118-11ED-89AC-F22D08015D11} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30999845" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376623577" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1384 99794aba2e898e8be53beafae36c894c91305bad6bc89b1158b977c26d0a367e.exe 1384 99794aba2e898e8be53beafae36c894c91305bad6bc89b1158b977c26d0a367e.exe 444 msedge.exe 444 msedge.exe 2328 msedge.exe 2328 msedge.exe 3676 identity_helper.exe 3676 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2156 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2156 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3488 iexplore.exe 2328 msedge.exe 2328 msedge.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1384 99794aba2e898e8be53beafae36c894c91305bad6bc89b1158b977c26d0a367e.exe 1384 99794aba2e898e8be53beafae36c894c91305bad6bc89b1158b977c26d0a367e.exe 1384 99794aba2e898e8be53beafae36c894c91305bad6bc89b1158b977c26d0a367e.exe 1384 99794aba2e898e8be53beafae36c894c91305bad6bc89b1158b977c26d0a367e.exe 3488 iexplore.exe 3488 iexplore.exe 1084 IEXPLORE.EXE 1084 IEXPLORE.EXE 1084 IEXPLORE.EXE 1084 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1384 wrote to memory of 3488 1384 99794aba2e898e8be53beafae36c894c91305bad6bc89b1158b977c26d0a367e.exe 81 PID 1384 wrote to memory of 3488 1384 99794aba2e898e8be53beafae36c894c91305bad6bc89b1158b977c26d0a367e.exe 81 PID 3488 wrote to memory of 1084 3488 iexplore.exe 82 PID 3488 wrote to memory of 1084 3488 iexplore.exe 82 PID 3488 wrote to memory of 1084 3488 iexplore.exe 82 PID 1384 wrote to memory of 2328 1384 99794aba2e898e8be53beafae36c894c91305bad6bc89b1158b977c26d0a367e.exe 85 PID 1384 wrote to memory of 2328 1384 99794aba2e898e8be53beafae36c894c91305bad6bc89b1158b977c26d0a367e.exe 85 PID 2328 wrote to memory of 2528 2328 msedge.exe 86 PID 2328 wrote to memory of 2528 2328 msedge.exe 86 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 1872 2328 msedge.exe 87 PID 2328 wrote to memory of 444 2328 msedge.exe 88 PID 2328 wrote to memory of 444 2328 msedge.exe 88 PID 2328 wrote to memory of 4292 2328 msedge.exe 89 PID 2328 wrote to memory of 4292 2328 msedge.exe 89 PID 2328 wrote to memory of 4292 2328 msedge.exe 89 PID 2328 wrote to memory of 4292 2328 msedge.exe 89 PID 2328 wrote to memory of 4292 2328 msedge.exe 89 PID 2328 wrote to memory of 4292 2328 msedge.exe 89 PID 2328 wrote to memory of 4292 2328 msedge.exe 89 PID 2328 wrote to memory of 4292 2328 msedge.exe 89 PID 2328 wrote to memory of 4292 2328 msedge.exe 89 PID 2328 wrote to memory of 4292 2328 msedge.exe 89 PID 2328 wrote to memory of 4292 2328 msedge.exe 89 PID 2328 wrote to memory of 4292 2328 msedge.exe 89 PID 2328 wrote to memory of 4292 2328 msedge.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\99794aba2e898e8be53beafae36c894c91305bad6bc89b1158b977c26d0a367e.exe"C:\Users\Admin\AppData\Local\Temp\99794aba2e898e8be53beafae36c894c91305bad6bc89b1158b977c26d0a367e.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" www.cfmogu.com2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3488 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1084
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.cfmogu.com/2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xdc,0x110,0x7fff7b7446f8,0x7fff7b744708,0x7fff7b7447183⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1460,2362610607341492840,15907581049575172526,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:23⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1460,2362610607341492840,15907581049575172526,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1460,2362610607341492840,15907581049575172526,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:83⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1460,2362610607341492840,15907581049575172526,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:13⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1460,2362610607341492840,15907581049575172526,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:13⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1460,2362610607341492840,15907581049575172526,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5444 /prefetch:83⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1460,2362610607341492840,15907581049575172526,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:13⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1460,2362610607341492840,15907581049575172526,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3668 /prefetch:13⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1460,2362610607341492840,15907581049575172526,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5624 /prefetch:83⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1460,2362610607341492840,15907581049575172526,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:13⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1460,2362610607341492840,15907581049575172526,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3968 /prefetch:13⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1460,2362610607341492840,15907581049575172526,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:13⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1460,2362610607341492840,15907581049575172526,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6536 /prefetch:83⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:3732 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff71aab5460,0x7ff71aab5470,0x7ff71aab54804⤵PID:204
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1460,2362610607341492840,15907581049575172526,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6536 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1460,2362610607341492840,15907581049575172526,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6644 /prefetch:13⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1460,2362610607341492840,15907581049575172526,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4016 /prefetch:83⤵PID:1544
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x308 0x3381⤵
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1472
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
779B
MD5d15dbe6d4142e78b10cdd870004dd469
SHA1fabb0cb6c8d54ec97eab5af8342442a4ee3ae415
SHA2560327ca984a77f2ae318c5a23cf4d1cacb5b5c0f0ad9f1e25ae540481436e6122
SHA512747fbc4ffbecc0635c87ff6f967a312c349c783f151c7454eef39aa6f9a7f38b802bddd6df59f7c4ab026088c4dc74c9330ed805f3e486344686eb702c442ffe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442
Filesize1KB
MD57d3589420072962eec947677f4962309
SHA1dbb6d48dcb8c9da81baffbb932da171ff16310e1
SHA2566ac3dd9eb79b9a97456a57d6ad2159de72d99ada596c1a8b87ff3247dd66886c
SHA5121b6fb7e873d8339579a5c3ab4d20589bd7121b5e52bc4807c56414f3bb2d10f3a2527344b7c7ea6ddbebd2c94b992d3a72f7534f57e850645dcb4e1047c534f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\69C6F6EC64E114822DF688DC12CDD86C
Filesize246B
MD576e4b2bcac92d3dcd1db9ab41dd38ecd
SHA1fad5d934e8a61347600ca4e22d9c10b200b23479
SHA2565a3736953f3a15966028c0c7c1a75dbd774b6d90f269a07e5fb9fca9d5b64437
SHA512728eddab0c80f8949ab595458907498d27eb10cb0448a6a9a03a155abf9c1407c8a5e1e06fc9cd1ce4178e19efa52bca281820206d8326a4ac08b18b0333e247
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442
Filesize446B
MD50c9d80e92047ee218c040d07c159679c
SHA1672423d7d5e9ab9efa6356c96d8b1cb2419ca7a3
SHA256aafee2c61ce38addea772949b6c0e439725e5378a20042b737ef02c6f9d7f8d9
SHA512850c749e017bcb5b160a8f4752654435835b5203b05b4e2dbe2e7db1924e13df70d57918dd94a35f40564f2b3bf222b949380329a6cb9026816a820375ae724d
-
Filesize
52KB
MD5b60da4e2e5aceba3ce3d87ee2cd872ee
SHA19bbdbf1f3ce2c000a86e0473da756a4b1031db41
SHA256b581fcc82c0462d60286a80912ab2ce5aca7d7b11c5cff0b5f74716dbb7dc453
SHA512664d6f893484252b339ff8f413a4cf9da9b0ef82ed74b097ba86a5f00b4d9740eef6e8a5b81e8be7e82ae4009928097baf15e65a03f31c4b92e44f593ce39874
-
Filesize
52KB
MD5b60da4e2e5aceba3ce3d87ee2cd872ee
SHA19bbdbf1f3ce2c000a86e0473da756a4b1031db41
SHA256b581fcc82c0462d60286a80912ab2ce5aca7d7b11c5cff0b5f74716dbb7dc453
SHA512664d6f893484252b339ff8f413a4cf9da9b0ef82ed74b097ba86a5f00b4d9740eef6e8a5b81e8be7e82ae4009928097baf15e65a03f31c4b92e44f593ce39874