Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 08:31
Static task
static1
Behavioral task
behavioral1
Sample
a45e3d16be91ff54097426d7e3c608e50f631da127e3a3eebb967fefe907b2ad.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a45e3d16be91ff54097426d7e3c608e50f631da127e3a3eebb967fefe907b2ad.exe
Resource
win10v2004-20220812-en
General
-
Target
a45e3d16be91ff54097426d7e3c608e50f631da127e3a3eebb967fefe907b2ad.exe
-
Size
15KB
-
MD5
a09484b53082430ffac353233091e3e0
-
SHA1
1dca11dcd65e2b58555aa8fe234366b699af253f
-
SHA256
a45e3d16be91ff54097426d7e3c608e50f631da127e3a3eebb967fefe907b2ad
-
SHA512
148a4eac2a485ed4d961fda31703862f948ad8bdb4322f9134079e4931ffbdcc5f84bd87125fd384291030d09d75b28ea42fd7550bf03377c2278e4b59e2c22e
-
SSDEEP
384:ZfWdjjPp5VGJdRvk4KWha7Wq7PO/4pfWh5oPt8hiuQc:NWtjPPVGJHvk4EPlfmKVBuD
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
Processes:
setup.exedescription ioc process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\507de965-15b1-4d5d-8aa9-4a72b6a3cc8a.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221203150356.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
msedge.exemsedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4852 msedge.exe 4852 msedge.exe 1132 msedge.exe 1132 msedge.exe 1256 msedge.exe 1256 msedge.exe 3868 identity_helper.exe 3868 identity_helper.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msedge.exepid process 1256 msedge.exe 1256 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a45e3d16be91ff54097426d7e3c608e50f631da127e3a3eebb967fefe907b2ad.exemsedge.exemsedge.exedescription pid process target process PID 3016 wrote to memory of 4844 3016 a45e3d16be91ff54097426d7e3c608e50f631da127e3a3eebb967fefe907b2ad.exe msedge.exe PID 3016 wrote to memory of 4844 3016 a45e3d16be91ff54097426d7e3c608e50f631da127e3a3eebb967fefe907b2ad.exe msedge.exe PID 4844 wrote to memory of 4888 4844 msedge.exe msedge.exe PID 4844 wrote to memory of 4888 4844 msedge.exe msedge.exe PID 3016 wrote to memory of 1256 3016 a45e3d16be91ff54097426d7e3c608e50f631da127e3a3eebb967fefe907b2ad.exe msedge.exe PID 3016 wrote to memory of 1256 3016 a45e3d16be91ff54097426d7e3c608e50f631da127e3a3eebb967fefe907b2ad.exe msedge.exe PID 1256 wrote to memory of 5068 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5068 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 1256 wrote to memory of 5080 1256 msedge.exe msedge.exe PID 4844 wrote to memory of 5100 4844 msedge.exe msedge.exe PID 4844 wrote to memory of 5100 4844 msedge.exe msedge.exe PID 4844 wrote to memory of 5100 4844 msedge.exe msedge.exe PID 4844 wrote to memory of 5100 4844 msedge.exe msedge.exe PID 4844 wrote to memory of 5100 4844 msedge.exe msedge.exe PID 4844 wrote to memory of 5100 4844 msedge.exe msedge.exe PID 4844 wrote to memory of 5100 4844 msedge.exe msedge.exe PID 4844 wrote to memory of 5100 4844 msedge.exe msedge.exe PID 4844 wrote to memory of 5100 4844 msedge.exe msedge.exe PID 4844 wrote to memory of 5100 4844 msedge.exe msedge.exe PID 4844 wrote to memory of 5100 4844 msedge.exe msedge.exe PID 4844 wrote to memory of 5100 4844 msedge.exe msedge.exe PID 4844 wrote to memory of 5100 4844 msedge.exe msedge.exe PID 4844 wrote to memory of 5100 4844 msedge.exe msedge.exe PID 4844 wrote to memory of 5100 4844 msedge.exe msedge.exe PID 4844 wrote to memory of 5100 4844 msedge.exe msedge.exe PID 4844 wrote to memory of 5100 4844 msedge.exe msedge.exe PID 4844 wrote to memory of 5100 4844 msedge.exe msedge.exe PID 4844 wrote to memory of 5100 4844 msedge.exe msedge.exe PID 4844 wrote to memory of 5100 4844 msedge.exe msedge.exe PID 4844 wrote to memory of 5100 4844 msedge.exe msedge.exe PID 4844 wrote to memory of 5100 4844 msedge.exe msedge.exe PID 4844 wrote to memory of 5100 4844 msedge.exe msedge.exe PID 4844 wrote to memory of 5100 4844 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a45e3d16be91ff54097426d7e3c608e50f631da127e3a3eebb967fefe907b2ad.exe"C:\Users\Admin\AppData\Local\Temp\a45e3d16be91ff54097426d7e3c608e50f631da127e3a3eebb967fefe907b2ad.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=a45e3d16be91ff54097426d7e3c608e50f631da127e3a3eebb967fefe907b2ad.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa955746f8,0x7ffa95574708,0x7ffa955747183⤵PID:4888
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15496496745620242224,5553760737747009261,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:23⤵PID:5100
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,15496496745620242224,5553760737747009261,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4852 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=a45e3d16be91ff54097426d7e3c608e50f631da127e3a3eebb967fefe907b2ad.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa955746f8,0x7ffa95574708,0x7ffa955747183⤵PID:5068
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,638494504266305292,4516988777974195121,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:23⤵PID:5080
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,638494504266305292,4516988777974195121,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1132 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,638494504266305292,4516988777974195121,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:83⤵PID:5044
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,638494504266305292,4516988777974195121,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:13⤵PID:720
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,638494504266305292,4516988777974195121,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:13⤵PID:5088
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,638494504266305292,4516988777974195121,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:13⤵PID:3512
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2136,638494504266305292,4516988777974195121,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4948 /prefetch:83⤵PID:2592
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,638494504266305292,4516988777974195121,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:13⤵PID:1072
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,638494504266305292,4516988777974195121,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:13⤵PID:2976
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2136,638494504266305292,4516988777974195121,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6184 /prefetch:83⤵PID:2328
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,638494504266305292,4516988777974195121,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6316 /prefetch:13⤵PID:4412
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,638494504266305292,4516988777974195121,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6364 /prefetch:13⤵PID:3240
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,638494504266305292,4516988777974195121,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 /prefetch:83⤵PID:4568
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:1940 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0xd8,0xc0,0xd0,0x7ff716325460,0x7ff716325470,0x7ff7163254804⤵PID:5040
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,638494504266305292,4516988777974195121,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3868 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2136,638494504266305292,4516988777974195121,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4196 /prefetch:83⤵PID:2612
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2136,638494504266305292,4516988777974195121,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5276 /prefetch:83⤵PID:5032
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2136,638494504266305292,4516988777974195121,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5312 /prefetch:83⤵PID:3440
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,638494504266305292,4516988777974195121,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1432 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1772 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2136,638494504266305292,4516988777974195121,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5636 /prefetch:83⤵PID:2336
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2136,638494504266305292,4516988777974195121,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3252 /prefetch:83⤵PID:3556
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2264
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C0427F5F77D9B3A439FC620EDAAB6177
Filesize471B
MD5e877e3e3b39a7035e3ea12fe708c369a
SHA1e5db0f99473d2c5fb6ffe4e9f1addac24a7ebe9e
SHA256a2bbce32037541da250a5e2f42d68f86e277eed8d65d44bc2fd7e21ad03d3845
SHA5125b76ca6cd6fe7ef0b0a9c23ffcc455b9532a5601cf4e2dc6bb2d4b84a4b72cf33d2989ecda2a1bfe1d296dd897230a5a3e412ae3d5aedb0ff96770d38956843e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C0427F5F77D9B3A439FC620EDAAB6177
Filesize412B
MD56c94f37a3e06540ca79d8aead0c59ff7
SHA17dd2d50add7e609ec854cfa8c195bbaee19b41eb
SHA256be9194a8876ba39aba512ebc04c4b6c0df92effc7c2a03a41422f5b9fea5668a
SHA5122231f7bcbacccb6aacfafc9453881e8a03dc3e037d97345e00aaf2b7150da9b221d3ac4931de89b9374e40f52a003be4e069be7f0f1478a74bc4e91affa2f43b
-
Filesize
152B
MD5e1661723f09a6aed8290c3f836ef2c2b
SHA155e08c810da94c08c5ee54ace181d4347f4e2ae5
SHA256a6527662d502234a1a9847973eb8e39e817aa145c43514229ba720150f74a2f2
SHA512dcd1e6320510594dd86568608d905ad5aacd4fa2b3369ac4daa1b938f7f0597da64747875a3567e5c05e5de34f77d87f5effdfda8091d01354699711f4bc12ad
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
152B
MD5e1661723f09a6aed8290c3f836ef2c2b
SHA155e08c810da94c08c5ee54ace181d4347f4e2ae5
SHA256a6527662d502234a1a9847973eb8e39e817aa145c43514229ba720150f74a2f2
SHA512dcd1e6320510594dd86568608d905ad5aacd4fa2b3369ac4daa1b938f7f0597da64747875a3567e5c05e5de34f77d87f5effdfda8091d01354699711f4bc12ad
-
Filesize
152B
MD57b3f352bbc8046d1d5d84c5bb693e2e5
SHA1e9d1ec6341b7959453e7cfb1ec65a55bf415cd4c
SHA256471da5f4a494fb6adb027e3fd80765a6c27a3967208aad8fb55e38a3f7fca7da
SHA512c984248535cb94fc265e93b9001d5936697dd2ff3ef8dfedd014df64b5f76e031eea1a594db3085e0149794ad90802a45c6cd985035ba383d1bf80ed928ff809
-
Filesize
152B
MD57b3f352bbc8046d1d5d84c5bb693e2e5
SHA1e9d1ec6341b7959453e7cfb1ec65a55bf415cd4c
SHA256471da5f4a494fb6adb027e3fd80765a6c27a3967208aad8fb55e38a3f7fca7da
SHA512c984248535cb94fc265e93b9001d5936697dd2ff3ef8dfedd014df64b5f76e031eea1a594db3085e0149794ad90802a45c6cd985035ba383d1bf80ed928ff809
-
Filesize
2KB
MD58181529020cbd851ef46ae6110962e10
SHA1d21d404f083c36565daf7abf601570b1c7275855
SHA256327023a1d3e817f256205412408b4f280451266321dd3f8978dfcea727c97952
SHA512ab525e8481ed6d3374c9ede1dc8cc3ab151cc9f1542a8286387f5fca7ec2092e66935ab97f6535c11f3cdc5963b9600018f64098b74600b091befd20056cd45c
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e