Analysis
-
max time kernel
219s -
max time network
222s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 01:54
Static task
static1
Behavioral task
behavioral1
Sample
b5ac0c29-5792-4494-b1da-39e24a1305f2.html
Resource
win10v2004-20220901-en
General
-
Target
b5ac0c29-5792-4494-b1da-39e24a1305f2.html
-
Size
635KB
-
MD5
ed71cd00d8d5828af0f009cb416b5f29
-
SHA1
a0a4dfee1827ebc7cbd9cd4b3d65b4af4523bb85
-
SHA256
75b86b1c8506479e325adef0d1709fe1085d18412735801382794bfaa11d673b
-
SHA512
06f0060c25653c84a2f7b8bf09a5c1ebe2de1dc6bd4fed9ff42892a950e972e7cff39a9c9fd638d7ce7acc975ca7c9b12674a57ff49b10ef71fbc8f2c9dfc282
-
SSDEEP
12288:4K6CzXEideCJbodCmGqbBtfWr13NCpEK3XoXtYStXtb:+Cz0ikqEdCWtfNpX4XuGXl
Malware Config
Extracted
qakbot
404.30
obama223
1668757345
68.47.128.161:443
87.65.160.87:995
172.90.139.138:2222
86.175.128.143:443
12.172.173.82:465
71.247.10.63:2083
47.41.154.250:443
91.254.215.167:443
71.31.101.183:443
81.229.117.95:2222
24.4.239.157:443
41.99.177.175:443
92.149.205.238:2222
73.230.28.7:443
47.229.96.60:443
186.188.2.193:443
174.112.25.29:2078
84.35.26.14:995
86.130.9.167:2222
116.74.163.221:443
86.195.32.149:2222
80.13.179.151:2222
64.207.237.118:443
24.206.27.39:443
170.253.25.35:443
157.231.42.190:995
170.249.59.153:443
174.101.111.4:443
23.240.47.58:995
99.229.146.120:443
184.155.91.69:443
89.129.109.27:2222
91.169.12.198:32100
87.202.101.164:50000
197.148.17.17:2078
94.63.65.146:443
69.133.162.35:443
24.64.114.59:2078
76.20.42.45:443
71.183.236.133:443
12.172.173.82:990
70.66.199.12:443
45.248.169.101:443
90.104.22.28:2222
90.89.95.158:2222
76.80.180.154:995
176.142.207.63:443
91.165.188.74:50000
72.82.136.90:443
88.126.94.4:50000
64.228.191.212:2222
12.172.173.82:21
142.161.27.232:2222
71.247.10.63:50003
108.6.249.139:443
184.176.154.83:995
174.104.184.149:443
82.34.170.37:443
47.34.30.133:443
71.247.10.63:995
70.64.77.115:443
175.205.2.54:443
92.207.132.174:2222
76.127.192.23:443
182.66.197.35:443
98.147.155.235:443
49.175.72.56:443
82.31.37.241:443
73.36.196.11:443
2.84.98.228:2222
188.54.79.88:995
184.153.132.82:443
74.66.134.24:443
172.117.139.142:995
24.64.114.59:3389
12.172.173.82:2087
78.92.133.215:443
24.64.114.59:2222
50.68.204.71:995
105.184.161.242:443
12.172.173.82:22
221.161.103.6:443
98.145.23.67:443
73.161.176.218:443
50.68.204.71:443
24.142.218.202:443
66.191.69.18:995
183.82.100.110:2222
24.49.232.96:443
70.115.104.126:995
176.151.15.101:443
93.156.103.241:443
86.217.250.15:2222
12.172.173.82:443
173.18.126.3:443
157.231.42.190:443
92.24.200.226:995
187.199.224.16:32103
213.91.235.146:443
188.4.142.139:995
199.83.165.233:443
63.248.148.87:443
58.162.223.233:443
102.159.188.241:443
12.172.173.82:50001
174.45.15.123:443
86.171.75.63:443
75.99.125.238:2222
75.158.15.211:443
79.37.204.67:443
27.110.134.202:995
12.172.173.82:993
58.247.115.126:995
181.118.183.116:443
31.167.227.31:443
2.83.62.105:443
77.126.81.208:443
174.112.25.29:2222
92.106.70.62:2222
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
WScript.exeNotepad.exedescription ioc process File opened (read-only) \??\E: WScript.exe File opened (read-only) \??\E: Notepad.exe -
Drops file in Program Files directory 2 IoCs
Processes:
setup.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221130015517.pma setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\3d2e8fcc-03e6-4e01-97fc-3d7c33a7d87a.tmp setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000003 msedge.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000003\HardwareID msedge.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000003\Service msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 3 IoCs
Processes:
powershell.exemsedge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings powershell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exemsedge.exemsedge.exemsedge.exeidentity_helper.exeregsvr32.exewermgr.exepid process 3952 powershell.exe 3952 powershell.exe 2372 msedge.exe 2372 msedge.exe 4992 msedge.exe 4992 msedge.exe 3188 msedge.exe 3188 msedge.exe 548 identity_helper.exe 548 identity_helper.exe 5540 regsvr32.exe 5540 regsvr32.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe 5620 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
regsvr32.exepid process 5540 regsvr32.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 3952 powershell.exe -
Suspicious use of FindShellTrayWindow 11 IoCs
Processes:
msedge.exepid process 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4992 wrote to memory of 1164 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 1164 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 4392 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 2372 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 2372 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 3504 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 3504 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 3504 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 3504 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 3504 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 3504 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 3504 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 3504 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 3504 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 3504 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 3504 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 3504 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 3504 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 3504 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 3504 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 3504 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 3504 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 3504 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 3504 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 3504 4992 msedge.exe msedge.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell start shell:Appsfolder\Microsoft.MicrosoftEdge_8wekyb3d8bbwe!MicrosoftEdge C:\Users\Admin\AppData\Local\Temp\b5ac0c29-5792-4494-b1da-39e24a1305f2.html1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --edge-redirect=Windows.Launch C:\Users\Admin\AppData\Local\Temp\b5ac0c29-5792-4494-b1da-39e24a1305f2.html1⤵
- Adds Run key to start application
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff985c046f8,0x7ff985c04708,0x7ff985c047182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,1447952634884858584,7262081123825966660,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,1447952634884858584,7262081123825966660,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,1447952634884858584,7262081123825966660,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1447952634884858584,7262081123825966660,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1447952634884858584,7262081123825966660,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2100,1447952634884858584,7262081123825966660,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4844 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1447952634884858584,7262081123825966660,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2100,1447952634884858584,7262081123825966660,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5284 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1447952634884858584,7262081123825966660,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,1447952634884858584,7262081123825966660,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2100,1447952634884858584,7262081123825966660,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5600 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,1447952634884858584,7262081123825966660,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6160 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings2⤵
- Drops file in Program Files directory
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x10c,0x104,0x108,0xd8,0xfc,0x7ff696df5460,0x7ff696df5470,0x7ff696df54803⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,1447952634884858584,7262081123825966660,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6160 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1447952634884858584,7262081123825966660,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1447952634884858584,7262081123825966660,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6464 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2100,1447952634884858584,7262081123825966660,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5124 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2100,1447952634884858584,7262081123825966660,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5132 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,1447952634884858584,7262081123825966660,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1848 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2100,1447952634884858584,7262081123825966660,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2096 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2100,1447952634884858584,7262081123825966660,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5224 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2100,1447952634884858584,7262081123825966660,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5380 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2100,1447952634884858584,7262081123825966660,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5920 /prefetch:82⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "E:\Agreement.js"1⤵
- Checks computer location settings
- Enumerates connected drives
-
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" debunked\irately.temp2⤵
-
C:\Windows\SysWOW64\regsvr32.exedebunked\irately.temp3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\Notepad.exe"C:\Windows\System32\Notepad.exe" E:\Agreement.js1⤵
- Enumerates connected drives
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\??\pipe\LOCAL\crashpad_4992_HJVGIIYRCXJCDZOCMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/548-159-0x0000000000000000-mapping.dmp
-
memory/740-146-0x0000000000000000-mapping.dmp
-
memory/1164-133-0x0000000000000000-mapping.dmp
-
memory/1396-144-0x0000000000000000-mapping.dmp
-
memory/1476-157-0x0000000000000000-mapping.dmp
-
memory/1512-142-0x0000000000000000-mapping.dmp
-
memory/1644-152-0x0000000000000000-mapping.dmp
-
memory/2312-148-0x0000000000000000-mapping.dmp
-
memory/2372-137-0x0000000000000000-mapping.dmp
-
memory/2456-163-0x0000000000000000-mapping.dmp
-
memory/3176-155-0x0000000000000000-mapping.dmp
-
memory/3188-153-0x0000000000000000-mapping.dmp
-
memory/3368-150-0x0000000000000000-mapping.dmp
-
memory/3504-140-0x0000000000000000-mapping.dmp
-
memory/3776-161-0x0000000000000000-mapping.dmp
-
memory/3952-132-0x0000025AB8A20000-0x0000025AB8A42000-memory.dmpFilesize
136KB
-
memory/3952-156-0x00007FF984A20000-0x00007FF9854E1000-memory.dmpFilesize
10.8MB
-
memory/3952-134-0x00007FF984A20000-0x00007FF9854E1000-memory.dmpFilesize
10.8MB
-
memory/4392-136-0x0000000000000000-mapping.dmp
-
memory/4568-158-0x0000000000000000-mapping.dmp
-
memory/5192-180-0x0000000000000000-mapping.dmp
-
memory/5316-184-0x0000000000000000-mapping.dmp
-
memory/5520-164-0x0000000000000000-mapping.dmp
-
memory/5540-165-0x0000000000000000-mapping.dmp
-
memory/5540-166-0x0000000000730000-0x000000000075E000-memory.dmpFilesize
184KB
-
memory/5540-167-0x0000000000760000-0x000000000078A000-memory.dmpFilesize
168KB
-
memory/5540-169-0x0000000000760000-0x000000000078A000-memory.dmpFilesize
168KB
-
memory/5568-182-0x0000000000000000-mapping.dmp
-
memory/5620-168-0x0000000000000000-mapping.dmp
-
memory/5620-171-0x0000000000CC0000-0x0000000000CEA000-memory.dmpFilesize
168KB
-
memory/5620-170-0x0000000000CC0000-0x0000000000CEA000-memory.dmpFilesize
168KB
-
memory/5812-173-0x0000000000000000-mapping.dmp
-
memory/5884-175-0x0000000000000000-mapping.dmp
-
memory/5968-176-0x0000000000000000-mapping.dmp
-
memory/6032-178-0x0000000000000000-mapping.dmp