Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 23:24
Static task
static1
Behavioral task
behavioral1
Sample
ce8154e4852844053b664473ee5f2ffbdd914856b9d02840245ab84a5aa05ea4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ce8154e4852844053b664473ee5f2ffbdd914856b9d02840245ab84a5aa05ea4.exe
Resource
win10v2004-20220901-en
General
-
Target
ce8154e4852844053b664473ee5f2ffbdd914856b9d02840245ab84a5aa05ea4.exe
-
Size
164KB
-
MD5
890d90892dcfe96e5197a2108d187b6d
-
SHA1
8ce951e1971822f26d7ee2b8f6eda1a26012a872
-
SHA256
ce8154e4852844053b664473ee5f2ffbdd914856b9d02840245ab84a5aa05ea4
-
SHA512
55b3cf7a89e9ac936157f0489221ca4e37f80c42768cbc8ad020efdb29a36b3f6931dec274d8fec23b07383371e56674adbf4e15a2a9c6b8d1d6aeec6cc7ac8a
-
SSDEEP
3072:2wxVMhOC/dTDbq91+mno3t4QZQ3rr5gFFUSZGE4JkdMDvdx559Zva:2TfFDbRnOTrr58FUSZGE4J1DvL5Pk
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 856 goooke.exe 4072 skyxpserver.exe 3608 solotan.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation ce8154e4852844053b664473ee5f2ffbdd914856b9d02840245ab84a5aa05ea4.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation goooke.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\688ab3b0-aaa9-4d7e-95a8-edada5172635.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221205195636.pma setup.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\aaa\solotan.exe ce8154e4852844053b664473ee5f2ffbdd914856b9d02840245ab84a5aa05ea4.exe File opened for modification C:\Windows\aaa\solotan.exe ce8154e4852844053b664473ee5f2ffbdd914856b9d02840245ab84a5aa05ea4.exe File created C:\Windows\aaa\goooke.exe ce8154e4852844053b664473ee5f2ffbdd914856b9d02840245ab84a5aa05ea4.exe File opened for modification C:\Windows\aaa\goooke.exe ce8154e4852844053b664473ee5f2ffbdd914856b9d02840245ab84a5aa05ea4.exe File created C:\Windows\aaa\skyxpserver.exe ce8154e4852844053b664473ee5f2ffbdd914856b9d02840245ab84a5aa05ea4.exe File opened for modification C:\Windows\aaa\skyxpserver.exe ce8154e4852844053b664473ee5f2ffbdd914856b9d02840245ab84a5aa05ea4.exe File opened for modification \??\c:\windows\aaa ce8154e4852844053b664473ee5f2ffbdd914856b9d02840245ab84a5aa05ea4.exe File created C:\Windows\aaa\__tmp_rar_sfx_access_check_240566015 ce8154e4852844053b664473ee5f2ffbdd914856b9d02840245ab84a5aa05ea4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1312 msedge.exe 1312 msedge.exe 32 msedge.exe 32 msedge.exe 3928 identity_helper.exe 3928 identity_helper.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe -
Suspicious use of FindShellTrayWindow 11 IoCs
pid Process 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 856 goooke.exe 856 goooke.exe 3608 solotan.exe 3608 solotan.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1852 wrote to memory of 856 1852 ce8154e4852844053b664473ee5f2ffbdd914856b9d02840245ab84a5aa05ea4.exe 82 PID 1852 wrote to memory of 856 1852 ce8154e4852844053b664473ee5f2ffbdd914856b9d02840245ab84a5aa05ea4.exe 82 PID 1852 wrote to memory of 856 1852 ce8154e4852844053b664473ee5f2ffbdd914856b9d02840245ab84a5aa05ea4.exe 82 PID 856 wrote to memory of 4072 856 goooke.exe 84 PID 856 wrote to memory of 4072 856 goooke.exe 84 PID 856 wrote to memory of 4072 856 goooke.exe 84 PID 856 wrote to memory of 3608 856 goooke.exe 85 PID 856 wrote to memory of 3608 856 goooke.exe 85 PID 856 wrote to memory of 3608 856 goooke.exe 85 PID 856 wrote to memory of 32 856 goooke.exe 86 PID 856 wrote to memory of 32 856 goooke.exe 86 PID 32 wrote to memory of 3812 32 msedge.exe 87 PID 32 wrote to memory of 3812 32 msedge.exe 87 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 556 32 msedge.exe 89 PID 32 wrote to memory of 1312 32 msedge.exe 90 PID 32 wrote to memory of 1312 32 msedge.exe 90 PID 32 wrote to memory of 2604 32 msedge.exe 91 PID 32 wrote to memory of 2604 32 msedge.exe 91 PID 32 wrote to memory of 2604 32 msedge.exe 91 PID 32 wrote to memory of 2604 32 msedge.exe 91 PID 32 wrote to memory of 2604 32 msedge.exe 91 PID 32 wrote to memory of 2604 32 msedge.exe 91 PID 32 wrote to memory of 2604 32 msedge.exe 91 PID 32 wrote to memory of 2604 32 msedge.exe 91 PID 32 wrote to memory of 2604 32 msedge.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce8154e4852844053b664473ee5f2ffbdd914856b9d02840245ab84a5aa05ea4.exe"C:\Users\Admin\AppData\Local\Temp\ce8154e4852844053b664473ee5f2ffbdd914856b9d02840245ab84a5aa05ea4.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\windows\aaa\goooke.exe"C:\windows\aaa\goooke.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\aaa\skyxpserver.exe"C:\Windows\aaa\skyxpserver.exe" -i3⤵
- Executes dropped EXE
PID:4072
-
-
C:\Windows\aaa\solotan.exe"C:\Windows\aaa\solotan.exe" -i3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://down-down.ff22113.cn:1958/zengda/111.asp3⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xf8,0x108,0x7ff8356e46f8,0x7ff8356e4708,0x7ff8356e47184⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,13683343311827690476,8842895231816328034,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:24⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,13683343311827690476,8842895231816328034,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,13683343311827690476,8842895231816328034,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:84⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13683343311827690476,8842895231816328034,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3768 /prefetch:14⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13683343311827690476,8842895231816328034,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3740 /prefetch:14⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13683343311827690476,8842895231816328034,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:14⤵PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2100,13683343311827690476,8842895231816328034,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5304 /prefetch:84⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13683343311827690476,8842895231816328034,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3940 /prefetch:14⤵PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2100,13683343311827690476,8842895231816328034,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5500 /prefetch:84⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13683343311827690476,8842895231816328034,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:14⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13683343311827690476,8842895231816328034,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:14⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,13683343311827690476,8842895231816328034,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4148 /prefetch:84⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings4⤵
- Drops file in Program Files directory
PID:2608 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x228,0x22c,0x230,0x204,0x234,0x7ff665595460,0x7ff665595470,0x7ff6655954805⤵PID:4624
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,13683343311827690476,8842895231816328034,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4148 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13683343311827690476,8842895231816328034,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:14⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13683343311827690476,8842895231816328034,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2644 /prefetch:14⤵PID:484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2100,13683343311827690476,8842895231816328034,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3280 /prefetch:84⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2100,13683343311827690476,8842895231816328034,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3348 /prefetch:84⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2100,13683343311827690476,8842895231816328034,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1144 /prefetch:84⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13683343311827690476,8842895231816328034,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:14⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2100,13683343311827690476,8842895231816328034,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4192 /prefetch:84⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2100,13683343311827690476,8842895231816328034,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5972 /prefetch:84⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,13683343311827690476,8842895231816328034,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5896 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2100,13683343311827690476,8842895231816328034,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5248 /prefetch:84⤵PID:2580
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3524
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD58060f3f9b5abd992be12fbc1251c8759
SHA169b203b6298944639b88d8cdf0f8203ae065c06e
SHA2564b4e04c1dac3dd5b41ffe491a4aa84765e3cbea0c5fb95cd99efe5a341fbb97e
SHA51238a69d5734163e63ff9b68b24df171a0eae0d9b82774cb906a8a0ce1eb0d926cd23d55217265a8dcede81a50ebeb6cb1f463bf6ba143b652ebc6766073c077d2
-
Filesize
44KB
MD529ba686d0f59e5b2ef91b4d34cb3bfd1
SHA1d1affe43f54d8451ea85134b40ea38bd48a016ae
SHA2560c2af050075b396344ad6e1253e13ee0efc6e45e9ea1a6bfc09752fcaeb8fe98
SHA5121644f46cc5dfe9e755ea92b8749d9a63c0e12b8ac7ca48f57b5edda3256f40f1282ef60d207f90c88fff1d3e326309aeb25454977f41dfee713320cc067c8a9f
-
Filesize
44KB
MD529ba686d0f59e5b2ef91b4d34cb3bfd1
SHA1d1affe43f54d8451ea85134b40ea38bd48a016ae
SHA2560c2af050075b396344ad6e1253e13ee0efc6e45e9ea1a6bfc09752fcaeb8fe98
SHA5121644f46cc5dfe9e755ea92b8749d9a63c0e12b8ac7ca48f57b5edda3256f40f1282ef60d207f90c88fff1d3e326309aeb25454977f41dfee713320cc067c8a9f
-
Filesize
64KB
MD5e0ddf679d7cb3aac87a9ad4ae8808233
SHA108527f4b296441254aca390f0010be64402b19a6
SHA25643f43ed1471a992a1deb818239ae49f44a0944491ae0701348da3a5ac79bd765
SHA51220bfc88dd3023e705ca42e0b27886db98d566b7a531b169305dab89797500f491daf948e05f43a3827c82c6a482691957a5f448d7d7044d809d50e75a0cb322e
-
Filesize
64KB
MD5e0ddf679d7cb3aac87a9ad4ae8808233
SHA108527f4b296441254aca390f0010be64402b19a6
SHA25643f43ed1471a992a1deb818239ae49f44a0944491ae0701348da3a5ac79bd765
SHA51220bfc88dd3023e705ca42e0b27886db98d566b7a531b169305dab89797500f491daf948e05f43a3827c82c6a482691957a5f448d7d7044d809d50e75a0cb322e
-
Filesize
56KB
MD58060f3f9b5abd992be12fbc1251c8759
SHA169b203b6298944639b88d8cdf0f8203ae065c06e
SHA2564b4e04c1dac3dd5b41ffe491a4aa84765e3cbea0c5fb95cd99efe5a341fbb97e
SHA51238a69d5734163e63ff9b68b24df171a0eae0d9b82774cb906a8a0ce1eb0d926cd23d55217265a8dcede81a50ebeb6cb1f463bf6ba143b652ebc6766073c077d2