Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27/12/2022, 07:13
Static task
static1
Behavioral task
behavioral1
Sample
1a247db9ae193938318c1935ebca3e258da2b1ba99902422066df28f4245a002.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1a247db9ae193938318c1935ebca3e258da2b1ba99902422066df28f4245a002.exe
Resource
win10v2004-20221111-en
General
-
Target
1a247db9ae193938318c1935ebca3e258da2b1ba99902422066df28f4245a002.exe
-
Size
52KB
-
MD5
19660b46a1d17197b4f9f77e0e8b2c58
-
SHA1
ca057c6880fe2596193c64150d5f4d4b817be94e
-
SHA256
1a247db9ae193938318c1935ebca3e258da2b1ba99902422066df28f4245a002
-
SHA512
43614e6589d7c3b444ce19c7922476e2cd1e864d9bf56947d1b2ebd207cecab2a3392f3df8cfbbc67cabb46c218e6320eb8d7a262590fa207542daa098853721
-
SSDEEP
768:1Kau5Zth5ux0XUtULLaFTt2TwomMrBWGYhyyQEQ2+RC6TIqv59z:YauBXkCanhcchyy7QBRC6TIqv59z
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3360 2336 cmd.exe 72 -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 2876 bcdedit.exe 1000 bcdedit.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation 1a247db9ae193938318c1935ebca3e258da2b1ba99902422066df28f4245a002.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\USC51-E8XAT-RTZTX-ATKTO.HTML 1a247db9ae193938318c1935ebca3e258da2b1ba99902422066df28f4245a002.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\08de7552-24fc-4fe9-8771-45b9a2fb8e3e.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221227081413.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3348 vssadmin.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4980 msedge.exe 4980 msedge.exe 4208 msedge.exe 4208 msedge.exe 2440 identity_helper.exe 2440 identity_helper.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2328 WMIC.exe Token: SeSecurityPrivilege 2328 WMIC.exe Token: SeTakeOwnershipPrivilege 2328 WMIC.exe Token: SeLoadDriverPrivilege 2328 WMIC.exe Token: SeSystemProfilePrivilege 2328 WMIC.exe Token: SeSystemtimePrivilege 2328 WMIC.exe Token: SeProfSingleProcessPrivilege 2328 WMIC.exe Token: SeIncBasePriorityPrivilege 2328 WMIC.exe Token: SeCreatePagefilePrivilege 2328 WMIC.exe Token: SeBackupPrivilege 2328 WMIC.exe Token: SeRestorePrivilege 2328 WMIC.exe Token: SeShutdownPrivilege 2328 WMIC.exe Token: SeDebugPrivilege 2328 WMIC.exe Token: SeSystemEnvironmentPrivilege 2328 WMIC.exe Token: SeRemoteShutdownPrivilege 2328 WMIC.exe Token: SeUndockPrivilege 2328 WMIC.exe Token: SeManageVolumePrivilege 2328 WMIC.exe Token: 33 2328 WMIC.exe Token: 34 2328 WMIC.exe Token: 35 2328 WMIC.exe Token: 36 2328 WMIC.exe Token: SeIncreaseQuotaPrivilege 2328 WMIC.exe Token: SeSecurityPrivilege 2328 WMIC.exe Token: SeTakeOwnershipPrivilege 2328 WMIC.exe Token: SeLoadDriverPrivilege 2328 WMIC.exe Token: SeSystemProfilePrivilege 2328 WMIC.exe Token: SeSystemtimePrivilege 2328 WMIC.exe Token: SeProfSingleProcessPrivilege 2328 WMIC.exe Token: SeIncBasePriorityPrivilege 2328 WMIC.exe Token: SeCreatePagefilePrivilege 2328 WMIC.exe Token: SeBackupPrivilege 2328 WMIC.exe Token: SeRestorePrivilege 2328 WMIC.exe Token: SeShutdownPrivilege 2328 WMIC.exe Token: SeDebugPrivilege 2328 WMIC.exe Token: SeSystemEnvironmentPrivilege 2328 WMIC.exe Token: SeRemoteShutdownPrivilege 2328 WMIC.exe Token: SeUndockPrivilege 2328 WMIC.exe Token: SeManageVolumePrivilege 2328 WMIC.exe Token: 33 2328 WMIC.exe Token: 34 2328 WMIC.exe Token: 35 2328 WMIC.exe Token: 36 2328 WMIC.exe Token: SeBackupPrivilege 4452 vssvc.exe Token: SeRestorePrivilege 4452 vssvc.exe Token: SeAuditPrivilege 4452 vssvc.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4936 wrote to memory of 2328 4936 1a247db9ae193938318c1935ebca3e258da2b1ba99902422066df28f4245a002.exe 87 PID 4936 wrote to memory of 2328 4936 1a247db9ae193938318c1935ebca3e258da2b1ba99902422066df28f4245a002.exe 87 PID 4936 wrote to memory of 2328 4936 1a247db9ae193938318c1935ebca3e258da2b1ba99902422066df28f4245a002.exe 87 PID 4936 wrote to memory of 4208 4936 1a247db9ae193938318c1935ebca3e258da2b1ba99902422066df28f4245a002.exe 89 PID 4936 wrote to memory of 4208 4936 1a247db9ae193938318c1935ebca3e258da2b1ba99902422066df28f4245a002.exe 89 PID 4208 wrote to memory of 4476 4208 msedge.exe 90 PID 4208 wrote to memory of 4476 4208 msedge.exe 90 PID 3360 wrote to memory of 3348 3360 cmd.exe 93 PID 3360 wrote to memory of 3348 3360 cmd.exe 93 PID 3360 wrote to memory of 2876 3360 cmd.exe 96 PID 3360 wrote to memory of 2876 3360 cmd.exe 96 PID 3360 wrote to memory of 1000 3360 cmd.exe 97 PID 3360 wrote to memory of 1000 3360 cmd.exe 97 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 3036 4208 msedge.exe 101 PID 4208 wrote to memory of 4980 4208 msedge.exe 102 PID 4208 wrote to memory of 4980 4208 msedge.exe 102 PID 4208 wrote to memory of 4220 4208 msedge.exe 103 PID 4208 wrote to memory of 4220 4208 msedge.exe 103 PID 4208 wrote to memory of 4220 4208 msedge.exe 103 PID 4208 wrote to memory of 4220 4208 msedge.exe 103 PID 4208 wrote to memory of 4220 4208 msedge.exe 103 PID 4208 wrote to memory of 4220 4208 msedge.exe 103 PID 4208 wrote to memory of 4220 4208 msedge.exe 103 PID 4208 wrote to memory of 4220 4208 msedge.exe 103 PID 4208 wrote to memory of 4220 4208 msedge.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a247db9ae193938318c1935ebca3e258da2b1ba99902422066df28f4245a002.exe"C:\Users\Admin\AppData\Local\Temp\1a247db9ae193938318c1935ebca3e258da2b1ba99902422066df28f4245a002.exe"1⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" process call create "cmd.exe /c vssadmin.exe delete shadows /all /quiet & bcdedit.exe /set {default} recoveryenabled no & bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\USC51-E8XAT-RTZTX-ATKTO.HTML2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffed9b546f8,0x7ffed9b54708,0x7ffed9b547183⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,16253597364363577288,5611017655753268560,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:23⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,16253597364363577288,5611017655753268560,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,16253597364363577288,5611017655753268560,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:83⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16253597364363577288,5611017655753268560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3852 /prefetch:13⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16253597364363577288,5611017655753268560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3132 /prefetch:13⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2148,16253597364363577288,5611017655753268560,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5340 /prefetch:83⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2148,16253597364363577288,5611017655753268560,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5504 /prefetch:83⤵PID:300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16253597364363577288,5611017655753268560,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:13⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16253597364363577288,5611017655753268560,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:13⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,16253597364363577288,5611017655753268560,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6036 /prefetch:83⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:3424 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x228,0x22c,0x230,0x204,0x234,0x7ff6fbd45460,0x7ff6fbd45470,0x7ff6fbd454804⤵PID:1776
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,16253597364363577288,5611017655753268560,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6036 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2148,16253597364363577288,5611017655753268560,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3188 /prefetch:83⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2148,16253597364363577288,5611017655753268560,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3520 /prefetch:83⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2148,16253597364363577288,5611017655753268560,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2308 /prefetch:83⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2148,16253597364363577288,5611017655753268560,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1048 /prefetch:83⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2148,16253597364363577288,5611017655753268560,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3596 /prefetch:83⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,16253597364363577288,5611017655753268560,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=208 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2148,16253597364363577288,5611017655753268560,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1916 /prefetch:83⤵PID:4816
-
-
-
C:\Windows\system32\cmd.execmd.exe /c vssadmin.exe delete shadows /all /quiet & bcdedit.exe /set {default} recoveryenabled no & bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:3348
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:2876
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:1000
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4452
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4916
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD52e3f69da567d4ee7eec47a522ca87ac8
SHA1f96eab881446e7373bb5800bc23f3cda32f318f9
SHA2567f000b50d1577cbb451c3065cf88315e4af63624525a2c73c5084aa5de9629bc
SHA5128ec037f0f6057396c9f03398e0df2a09adb6e2b0084e033d1a77c30ccd9d95ad8c9c6474dacea36dceb51f014050752f8a9c9392b44a40ea59510d9f46db9667