Analysis
-
max time kernel
153s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 10:39
Static task
static1
Behavioral task
behavioral1
Sample
9bdada33f3fc95ffccc40f10a047caa88ba45857cc18c545cd0d35a601128e61.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9bdada33f3fc95ffccc40f10a047caa88ba45857cc18c545cd0d35a601128e61.exe
Resource
win10v2004-20220901-en
General
-
Target
9bdada33f3fc95ffccc40f10a047caa88ba45857cc18c545cd0d35a601128e61.exe
-
Size
1.4MB
-
MD5
3418d80859058585e177aaa64641e820
-
SHA1
28e835edad756f392e909b7761892f46cf0bdded
-
SHA256
9bdada33f3fc95ffccc40f10a047caa88ba45857cc18c545cd0d35a601128e61
-
SHA512
ae0f671343fd0d8625f659392fd40189864aea4029cbfdadf553c9db40e462692c44fb8eaa3f1e2065bc25df00d934203e6f25f066ac39936935f391e6004874
-
SSDEEP
24576:UGXghB8kjjGlTBiBkdXORxhQZoaeTKh1YTqdoIMGF0NyzZhb:UJCBh+vhQfaKh142wUD
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\WINDOWS\system32\drivers\etc\hosts 9bdada33f3fc95ffccc40f10a047caa88ba45857cc18c545cd0d35a601128e61.exe File created C:\WINDOWS\system32\drivers\etc\hosts 9bdada33f3fc95ffccc40f10a047caa88ba45857cc18c545cd0d35a601128e61.exe -
Executes dropped EXE 1 IoCs
pid Process 1008 CFleilei.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\CFleilei.exe 9bdada33f3fc95ffccc40f10a047caa88ba45857cc18c545cd0d35a601128e61.exe File created C:\Windows\SysWOW64\PastGxdsN.sys CFleilei.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\d5c00afd-16b7-4d21-b441-9b4b7fabb591.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221203164327.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.cffuzhu.com" 9bdada33f3fc95ffccc40f10a047caa88ba45857cc18c545cd0d35a601128e61.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3752 msedge.exe 3752 msedge.exe 4316 msedge.exe 4316 msedge.exe 4032 9bdada33f3fc95ffccc40f10a047caa88ba45857cc18c545cd0d35a601128e61.exe 4032 9bdada33f3fc95ffccc40f10a047caa88ba45857cc18c545cd0d35a601128e61.exe 4032 9bdada33f3fc95ffccc40f10a047caa88ba45857cc18c545cd0d35a601128e61.exe 4032 9bdada33f3fc95ffccc40f10a047caa88ba45857cc18c545cd0d35a601128e61.exe 2544 identity_helper.exe 2544 identity_helper.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4032 9bdada33f3fc95ffccc40f10a047caa88ba45857cc18c545cd0d35a601128e61.exe 4032 9bdada33f3fc95ffccc40f10a047caa88ba45857cc18c545cd0d35a601128e61.exe 4032 9bdada33f3fc95ffccc40f10a047caa88ba45857cc18c545cd0d35a601128e61.exe 4032 9bdada33f3fc95ffccc40f10a047caa88ba45857cc18c545cd0d35a601128e61.exe 1008 CFleilei.exe 1008 CFleilei.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4032 wrote to memory of 4316 4032 9bdada33f3fc95ffccc40f10a047caa88ba45857cc18c545cd0d35a601128e61.exe 82 PID 4032 wrote to memory of 4316 4032 9bdada33f3fc95ffccc40f10a047caa88ba45857cc18c545cd0d35a601128e61.exe 82 PID 4032 wrote to memory of 1008 4032 9bdada33f3fc95ffccc40f10a047caa88ba45857cc18c545cd0d35a601128e61.exe 83 PID 4032 wrote to memory of 1008 4032 9bdada33f3fc95ffccc40f10a047caa88ba45857cc18c545cd0d35a601128e61.exe 83 PID 4032 wrote to memory of 1008 4032 9bdada33f3fc95ffccc40f10a047caa88ba45857cc18c545cd0d35a601128e61.exe 83 PID 4316 wrote to memory of 4072 4316 msedge.exe 84 PID 4316 wrote to memory of 4072 4316 msedge.exe 84 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 372 4316 msedge.exe 86 PID 4316 wrote to memory of 3752 4316 msedge.exe 87 PID 4316 wrote to memory of 3752 4316 msedge.exe 87 PID 4316 wrote to memory of 3296 4316 msedge.exe 89 PID 4316 wrote to memory of 3296 4316 msedge.exe 89 PID 4316 wrote to memory of 3296 4316 msedge.exe 89 PID 4316 wrote to memory of 3296 4316 msedge.exe 89 PID 4316 wrote to memory of 3296 4316 msedge.exe 89 PID 4316 wrote to memory of 3296 4316 msedge.exe 89 PID 4316 wrote to memory of 3296 4316 msedge.exe 89 PID 4316 wrote to memory of 3296 4316 msedge.exe 89 PID 4316 wrote to memory of 3296 4316 msedge.exe 89 PID 4316 wrote to memory of 3296 4316 msedge.exe 89 PID 4316 wrote to memory of 3296 4316 msedge.exe 89 PID 4316 wrote to memory of 3296 4316 msedge.exe 89 PID 4316 wrote to memory of 3296 4316 msedge.exe 89 PID 4316 wrote to memory of 3296 4316 msedge.exe 89 PID 4316 wrote to memory of 3296 4316 msedge.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\9bdada33f3fc95ffccc40f10a047caa88ba45857cc18c545cd0d35a601128e61.exe"C:\Users\Admin\AppData\Local\Temp\9bdada33f3fc95ffccc40f10a047caa88ba45857cc18c545cd0d35a601128e61.exe"1⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.cffuzhu.com/2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8353346f8,0x7ff835334708,0x7ff8353347183⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,15067798168986612017,12603349036068599562,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:23⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,15067798168986612017,12603349036068599562,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,15067798168986612017,12603349036068599562,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:83⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15067798168986612017,12603349036068599562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3712 /prefetch:13⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15067798168986612017,12603349036068599562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3824 /prefetch:13⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2120,15067798168986612017,12603349036068599562,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5196 /prefetch:83⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2120,15067798168986612017,12603349036068599562,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5756 /prefetch:83⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15067798168986612017,12603349036068599562,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:13⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15067798168986612017,12603349036068599562,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:13⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15067798168986612017,12603349036068599562,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3904 /prefetch:13⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,15067798168986612017,12603349036068599562,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6252 /prefetch:83⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:3940 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1bc,0x22c,0x7ff781e05460,0x7ff781e05470,0x7ff781e054804⤵PID:4524
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,15067798168986612017,12603349036068599562,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6252 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2120,15067798168986612017,12603349036068599562,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3016 /prefetch:83⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2120,15067798168986612017,12603349036068599562,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3284 /prefetch:83⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2120,15067798168986612017,12603349036068599562,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3244 /prefetch:83⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2120,15067798168986612017,12603349036068599562,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6420 /prefetch:83⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,15067798168986612017,12603349036068599562,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3836 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2120,15067798168986612017,12603349036068599562,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1728 /prefetch:83⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2120,15067798168986612017,12603349036068599562,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5628 /prefetch:83⤵PID:3392
-
-
-
C:\Windows\SysWOW64\CFleilei.exeC:\Windows\system32\CFleilei.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.75ts.com/?ldgq3⤵PID:3168
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8353346f8,0x7ff835334708,0x7ff8353347184⤵PID:4040
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:772
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B
Filesize1KB
MD58461b627fd0e03a19c0066e408ea7046
SHA1799fe8fc1b7cd1e9b361bc29eb53d22ac4650f22
SHA2563cfe7bdbfc30c77d71caba0bb759ffb0c37c243f89ff5de9352fb37a2d977ba7
SHA5122d965a4516e87529eb3ed7bcb366e1b42711b1fee840a2b3679a4298ccbdb5634f4f5c2fdfc23db41e297fa01d153f5014bcdbd184088f27c41c4877134fe04d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\349D186F1CB5682FA0194D4F3754EF36_97A2CB43E01F27293633B7B57353C80B
Filesize1KB
MD5aae127276e11f73783b91ae7865b959b
SHA1b886fc94dad951346d28aa28e3617aacd9782037
SHA256323a186c50387c4bcc670314dd3f21ae7bf7745822460ffb9e1af745f33628a0
SHA512f8f6001f3b74f9ffe068df182084511582c25305f42db292803fadeeaea04622334ba036a51d001d86619fd6eaaa7becad9e5befa2fa7d6968499f01b2c23e7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3
Filesize1KB
MD5e29a26604b680270f8e11b80d9651225
SHA1cd5d1cdacacc222587f58cd13c67d8b4861b50ea
SHA25698a02c4653cfcdee506bc09effe6f168f5af5950e700f94ccc4bd421f2fe01cb
SHA5126fd94823a98e52a899a094c2f3b9cd1f7b63c62d7bfe0cd4e0f784494d3981fdf723aa09253c13c964ec74315d552127784007c7fb2da0ed6b5d1ea3c0bae75f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B
Filesize508B
MD58a70693ad43b4fa54d445b3cc23cd438
SHA158091c59220f8f6c8684fcbaebcb7371ede6b29e
SHA2567a1731f511a8dc9694542382ae88d434cf131488b3f9421fb8cfe3bba95870e8
SHA512bd5e75fc14653badae7a41169a21f2d4e9ce7556a20f641f2d2f9b8874965dad691273119483cfd7a7e22627b79255ce6202b6c53258ffa3a16551538abe3829
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\349D186F1CB5682FA0194D4F3754EF36_97A2CB43E01F27293633B7B57353C80B
Filesize532B
MD519fe1a6429a844bb63531a47a9bafa41
SHA15656a5dacbd1e1606dc3c341858554901f999969
SHA2568beff46b866a0dd8a0e173c9ecc4411c3e249678be1fc8d7a9989da1d760795d
SHA5125a21b4710937446e8639d98237eb167002eb7f0da741c07484dc45baf7229341f60931f9a54bfb889465fc88643ad585732bbdfb1da27872bd75e5cad65595b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3
Filesize506B
MD5bb9dc97b62376f987cd1c171b2abf78f
SHA159a8e94b773e3e2b120daad9a304bd552a0818ba
SHA25667310f411bfa859c9ccb6304e46180a271e7b20f8a1abea328f3da46c29fdab7
SHA51288c521040f28cec2d24bc2c6e7a3f629caa805a8c4daf5aa18e2ad9dbe30e3f6b9c32e5eb48a36f2264cad62b2a7366f8e731e2d492799b6c26a6bc954817b4e
-
Filesize
152B
MD5b8814439123c54cbc8e61bb010a24511
SHA1403ad16668fc85e4ef366f00749eaec0f88b94b0
SHA256ee60f00dcded0ed07c9c88d582efde48ddc73d1f1a28081d5e2dea006c4ac894
SHA512de05eaa43d562783009cb1ade9c87f3d1b1020c951067d2f95dbab698b5f35271790bb9a547dd30cacf68783e09a4bdd1dfbfcf8cf53343b132b9c3d6c4d2800
-
Filesize
632KB
MD5f8441fa40c9108ba8a056b2012ea4f64
SHA13444544f8abbf47165d3f3303274d3ce7325a8c2
SHA256e946af5ee5c30450ab8d85fb0387a8f369e720794195ee3487f22a6b0b02dc4f
SHA51267395c945ad4f3b4c2edfb6ec322f430230da699c1e9956fd768b794c0719e4a85af5c44b0611380c3483182d7d2dce9a46364b032d3b138c1b296a2d9e0269c
-
Filesize
632KB
MD5f8441fa40c9108ba8a056b2012ea4f64
SHA13444544f8abbf47165d3f3303274d3ce7325a8c2
SHA256e946af5ee5c30450ab8d85fb0387a8f369e720794195ee3487f22a6b0b02dc4f
SHA51267395c945ad4f3b4c2edfb6ec322f430230da699c1e9956fd768b794c0719e4a85af5c44b0611380c3483182d7d2dce9a46364b032d3b138c1b296a2d9e0269c
-
Filesize
176B
MD580f383a4d1210550bc6f3b12a10fd7a1
SHA11d7a5b4d27330e3e9fce9643a1dd9f21c9fec2b0
SHA25616619b7484e7b6af3a1bd7fdd21e9541485c0e557bcc265cb289e369690a8301
SHA512a5c901e354607bf052a0bcc5d0b802dd0382c49cf9fdf44d269b0e970a3f8d0532af8090618ceea5e7395b87ce1dd981266cf9cfe7f58e1bcf6e8a6f1d33726a
-
Filesize
176B
MD580f383a4d1210550bc6f3b12a10fd7a1
SHA11d7a5b4d27330e3e9fce9643a1dd9f21c9fec2b0
SHA25616619b7484e7b6af3a1bd7fdd21e9541485c0e557bcc265cb289e369690a8301
SHA512a5c901e354607bf052a0bcc5d0b802dd0382c49cf9fdf44d269b0e970a3f8d0532af8090618ceea5e7395b87ce1dd981266cf9cfe7f58e1bcf6e8a6f1d33726a