Overview
overview
8Static
static
1CyberSniff...ff.exe
windows7-x64
1CyberSniff...ff.exe
windows10-2004-x64
1CyberSniff...ff.exe
windows7-x64
1CyberSniff...ff.exe
windows10-2004-x64
8CyberSniff...PC.dll
windows7-x64
1CyberSniff...PC.dll
windows10-2004-x64
1CyberSniff...rs.dll
windows7-x64
1CyberSniff...rs.dll
windows10-2004-x64
1CyberSniff...pf.dll
windows7-x64
1CyberSniff...pf.dll
windows10-2004-x64
1CyberSniff...on.dll
windows7-x64
1CyberSniff...on.dll
windows10-2004-x64
1CyberSniff...et.dll
windows7-x64
1CyberSniff...et.dll
windows10-2004-x64
1CyberSniff...ss.dll
windows7-x64
1CyberSniff...ss.dll
windows10-2004-x64
1CyberSniff...ap.dll
windows7-x64
1CyberSniff...ap.dll
windows10-2004-x64
1CyberSniff...or.dll
windows7-x64
1CyberSniff...or.dll
windows10-2004-x64
1CyberSniff...nt.dll
windows7-x64
1CyberSniff...nt.dll
windows10-2004-x64
1CyberSniff...if.dll
windows7-x64
1CyberSniff...if.dll
windows10-2004-x64
1Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23-03-2023 20:05
Static task
static1
Behavioral task
behavioral1
Sample
CyberSniff-Uncompiled/CyberSniff.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
CyberSniff-Uncompiled/CyberSniff.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
CyberSniff-Uncompiled/CyberSniff.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
CyberSniff-Uncompiled/CyberSniff.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
CyberSniff-Uncompiled/DiscordRPC.dll
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
CyberSniff-Uncompiled/DiscordRPC.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
CyberSniff-Uncompiled/MaterialDesignColors.dll
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
CyberSniff-Uncompiled/MaterialDesignColors.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
CyberSniff-Uncompiled/MaterialDesignThemes.Wpf.dll
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
CyberSniff-Uncompiled/MaterialDesignThemes.Wpf.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
CyberSniff-Uncompiled/Newtonsoft.Json.dll
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
CyberSniff-Uncompiled/Newtonsoft.Json.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
CyberSniff-Uncompiled/PacketDotNet.dll
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
CyberSniff-Uncompiled/PacketDotNet.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
CyberSniff-Uncompiled/SharpCompress.dll
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
CyberSniff-Uncompiled/SharpCompress.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
CyberSniff-Uncompiled/SharpPcap.dll
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
CyberSniff-Uncompiled/SharpPcap.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
CyberSniff-Uncompiled/SimpleInjector.dll
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
CyberSniff-Uncompiled/SimpleInjector.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
CyberSniff-Uncompiled/System.Management.dll
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
CyberSniff-Uncompiled/System.Management.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
CyberSniff-Uncompiled/WpfAnimatedGif.dll
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
CyberSniff-Uncompiled/WpfAnimatedGif.dll
Resource
win10v2004-20230220-en
General
-
Target
CyberSniff-Uncompiled/CyberSniff.exe
-
Size
161KB
-
MD5
8d130996fc33ba685a1c95c06db984cb
-
SHA1
a2dfe8044ee494582cad82a099c14b1819b79d0b
-
SHA256
895fef1d7338661aa3cd4f40fd226262c642310169835c270994904e81380d26
-
SHA512
ff895da3f850adbe3e5e18391480339e521c018b18245254c9c36697481af9c10e4628ece4abfc6091ffde0a19482a7f4e0a692912db5aa4375f08c068cc5557
-
SSDEEP
3072:mguAgTsGLYEZl70PsLko1Gs2T/0oim/JbRZzlZ2pfqZ1:m5twsLko1Gs2T/pPlZ2xq
Malware Config
Signatures
-
Downloads MZ/PE file
-
Drops file in Program Files directory 2 IoCs
Processes:
setup.exedescription ioc process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\e4267ebc-9862-4256-8dc9-e5261835ce78.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20230323210532.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
NTFS ADS 1 IoCs
Processes:
msedge.exedescription ioc process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 924901.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1576 msedge.exe 1576 msedge.exe 3856 msedge.exe 3856 msedge.exe 1448 identity_helper.exe 1448 identity_helper.exe 5700 msedge.exe 5700 msedge.exe 5700 msedge.exe 5700 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
msedge.exepid process 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
msedge.exepid process 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
CyberSniff.exemsedge.exedescription pid process target process PID 2144 wrote to memory of 3856 2144 CyberSniff.exe msedge.exe PID 2144 wrote to memory of 3856 2144 CyberSniff.exe msedge.exe PID 3856 wrote to memory of 1716 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 1716 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 2436 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 1576 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 1576 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 4308 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 4308 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 4308 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 4308 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 4308 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 4308 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 4308 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 4308 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 4308 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 4308 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 4308 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 4308 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 4308 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 4308 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 4308 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 4308 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 4308 3856 msedge.exe msedge.exe PID 3856 wrote to memory of 4308 3856 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\CyberSniff-Uncompiled\CyberSniff.exe"C:\Users\Admin\AppData\Local\Temp\CyberSniff-Uncompiled\CyberSniff.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x64&rid=win10-x64&apphost_version=6.0.6&gui=true2⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffdebb346f8,0x7ffdebb34708,0x7ffdebb347183⤵PID:1716
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,4446441991882151479,9048269929857911455,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:23⤵PID:2436
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,4446441991882151479,9048269929857911455,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1576 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,4446441991882151479,9048269929857911455,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2960 /prefetch:83⤵PID:4308
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4446441991882151479,9048269929857911455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3664 /prefetch:13⤵PID:2584
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4446441991882151479,9048269929857911455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3672 /prefetch:13⤵PID:2116
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4446441991882151479,9048269929857911455,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:13⤵PID:5044
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2144,4446441991882151479,9048269929857911455,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5372 /prefetch:83⤵PID:4968
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4446441991882151479,9048269929857911455,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:13⤵PID:4940
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2144,4446441991882151479,9048269929857911455,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5860 /prefetch:83⤵PID:1272
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4446441991882151479,9048269929857911455,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:13⤵PID:2872
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4446441991882151479,9048269929857911455,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:13⤵PID:1120
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4446441991882151479,9048269929857911455,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:13⤵PID:1768
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,4446441991882151479,9048269929857911455,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6712 /prefetch:83⤵PID:4156
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:2884 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff6bddc5460,0x7ff6bddc5470,0x7ff6bddc54804⤵PID:4820
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,4446441991882151479,9048269929857911455,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6712 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4446441991882151479,9048269929857911455,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:13⤵PID:4424
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4446441991882151479,9048269929857911455,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:13⤵PID:2216
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,4446441991882151479,9048269929857911455,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6828 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5700
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3728
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD578c7656527762ed2977adf983a6f4766
SHA121a66d2eefcb059371f4972694057e4b1f827ce6
SHA256e1000099751602ae1adcec6f1c74e1d65f472936817b45239dfed4b043984296
SHA5120a8e58ae95163b3cdf8e81b5085887761e73cb7c836a1a6a972e837fb3df69b2ac70cfd6311d06d40656344ec35eb48e512f007561480f0345486ac2b329be0b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD5c4dc582a3cf2945e096e874f8f7b20ee
SHA1c2f86b6b631ca97b6fd5a7dd53a46bf1f6bf59d4
SHA256fbdae38435cc7c6a9657d2865e32e3fe4b1738290922439be51de67a13591b4a
SHA512d626af872a35aca9f99c7bb219e5ca198322af2b1855b3ed9d3aee6c3252680c118afb23842fc2dffd361b9b9c546ea69ef9e613425fd01216cb33046215b59b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD5cff3ca144427aec7edd754ff2dc36a4e
SHA178cde7f422374f3f3ff274555a353b2a32182789
SHA25674a173a26f14460638a91f7f69ae3d4a210bbe906d366deab5498c3dcc2df7fd
SHA5120a887db02b3835c4c565ad89a089c337dc1670335f415fc18393ea40b8c7f7e01aaf0d46d0fb107e5a58717202c97c60a3b9d15713f4f2c63a033833534014bf
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
2KB
MD5fc74a890e22834243a899d815208ac63
SHA19c664b1c92f5d284cb1e16fbe9a7e1d3c714f7d0
SHA25600e2895ddb169bd27c25fa09f2af311a382eaa44bb18c292b3d244750a4d40bf
SHA512139a339e38773daec35b06a180f4876f6cb6e209a1ee22f3960f6327259bed440ffc256f6fe0efe253483da55bab38fff3901d38dc782fceaf5214f9f1ad808b
-
Filesize
1KB
MD59204835782a6e13e90f4fe7820f03e91
SHA151e6457df49bb8a2e0b2d4c1ade5c4a818c61d29
SHA25661c8e8cb18ff398b16d945e81df29f9f4a33b6f4bd8a4f742bc99cd18e2fd8e3
SHA512fa285b956778dc607e9fc487a8110f6f29d1a0e793a318eddb08922bce00b211a384740f7bf2eece66000bada8c114286dfb1f5230fb19d6d0f3884d7fb35c04
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD588054015755e7847b23b64eccb2e1073
SHA143b653cd525322282df10c464a5091ca280ff0ca
SHA2563eae87de08b4c963fcc219584e83398032a8dd8be6a5b33bfb2ad16346cb1923
SHA512d4912c78fc8de61ac6aec8f4c489aaa67541f41df7a030a03807ae93996ef614ce192bf28e0b36ab6339ef703cadf5e22acd3d2566e07ba55da9a98ecfbbe32f
-
Filesize
4KB
MD5c5e5220dc46fd89de9c10e1c2afc5c60
SHA1f9fdbdf6787f3a25edee0bf108d328ece60ad329
SHA256b520de710c86feed02b8e2e88c8c70859242dc8d58fd4bd59ebc7cfad19a66b5
SHA512d1737fd805e97e184b0415d08b820e11e2607f969ecd5fff077c6f28dd7b0b875c586c4774d0c066d98d05abf6190c7977e6c9364e6fc93a490f3080ece3517f
-
Filesize
6KB
MD53102e51a69b87b08fb3a3a95233d691e
SHA193c43bdf64061bbec76c177b1307ad98737973fb
SHA256d86eddce323bdc2bbe7183a2ad133957dd40f7953b93567f8466e443ec2e6a8c
SHA512cf47275e2f48d4c5ea2ae90a546a51f21d40511e705b001c4e242e52c8888a1b397cf649429e15a550afd9ced1961b24011cde114494195cd4f5c685fb1fe8e0
-
Filesize
24KB
MD502ee7addc9e8a2d07af55556ebf0ff5c
SHA1020161bb64ecb7c6e6886ccc055908984dc651d8
SHA256552d3ed359b7a52278ce621674d16428d8a7969f6cd5663df18e240cce66aadc
SHA512567989543c3848a0c3276d96b96ca761f750e4b71fb74f36d809f590ffe16a72fd5ece251737a8b1ffe65f0051e211bd7ad19d2b8b0b7ca1b7ffc86dd2a52883
-
Filesize
870B
MD5bad2a5034839b1825c97069c52c07eea
SHA1e810179512217fa9f21b0b66d826e9d67df96ecf
SHA256487a85b7ab9e29734dfb2a1c53548f0d2d2f3a491b824c77c8f8cabecb2548f9
SHA5121949b00c497b2bcd9f259621986fb17b8da962f6a3200e3010a900415e6463a5509fe496f68a651902ed964aa109aa9fd7fbbf7099cbcb162f7874506d023c54
-
Filesize
872B
MD502e103f6d99de4aa94141e7c2a9dbd67
SHA103dd657d30c8cc98d44ae2106a3d9b00419c67eb
SHA256eb73dc9e64478c5009dfb68a690cfc7f1e967d5bd3c3dfe6943b7c96a14fa80e
SHA5125bbb50529fa1e9f0e49cd5093c21043940896061132815c14b73020c9fcc6aa0a1092df15801d8b3f2ac6df66e19c8011212b584ca2db0b87afd66a063c40240
-
Filesize
870B
MD514ea40d7a2ea13f182c8b4187d7bbbdc
SHA1a03bfda7ccc04f72139fc108d7b8a3d4015788bc
SHA256b186beee740f5a73823163f0dd91b73134e5fe73f758c250a98c4bba54cfb219
SHA5128050b44d12c9cb4e5c9e08ca8e11e4f3fa828bfb8bc4352db1594bd4e42e9805bc1e9fff10dd73992d78a65ba0f034ef62477dc2b125c6905043040098d55996
-
Filesize
872B
MD5c39e92a6bb04adb7dada34923584baf6
SHA16d17eed97d77a02a53fe18114e073a8604281d93
SHA2560c408872cb08e9d6bf0f6f2b047c036a68d579aa4aab4b3fedf08c8c870ded5b
SHA5126acdec4103a2ea83e519bd0367b1c754161a3b4db6dce1656eac57859065ea2e8bce3c597d985137a6b11890f28c618eaa5d6793a60cb5fde4d38e95a4881fee
-
Filesize
872B
MD514a10c4910b4bbd07e2ecf1ab342ace1
SHA14c154b70204dcaa8657dea6eb7b5e534cf0f57dc
SHA2565bbb12dfc2d2f16063c49933a64b88628e99cd45bdbaf69594f7c1d2a3b5193b
SHA5127c7dcc15903b1c63b8f1654d732144473a8611b83f560edb9ca5c738124d48bd1216de6eaaadada31010758c207aecca21ddc219c4d2a5b105245c8fb0a02c24
-
Filesize
870B
MD54502a205fb078b853eb31521e369fe88
SHA1a4dc0f16face0ec8fa57ba4a58db1a5adb06cd8f
SHA256bf817c0481001ac5402f19a6d06dde246a141263a823b5fe73b4382cb437d4ba
SHA512d1d6c21bd83778759074268d02eec7bcc204880a84cce9b4d7fed33b96b23bf0eacdcc8940ee81c82956a4d89a870efe35d2be02504028727481b1cce758ff21
-
Filesize
704B
MD5b97d90b783739e63f03c30d3b204944c
SHA1db6371e581d3c6f0015024dd722b97bed086d809
SHA2561cb115626bde6f337af38a82bfe2af45efa8344ef0aaee0cc2090b4562a84038
SHA51224a1a2638c16055074b354ae8fb9d0b31d47a8390a3ef97d806bc4daca184443a74eb328de55466f58ab4e7e7a1ae4b752e6a79c2eb3443494ccc504dcc73d42
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
12KB
MD5efd50f3f8724fd60bbb3d06c746ca60e
SHA18d00fd79363d42ba8defb0f88fe3d530f8f0667e
SHA256e07f1a1ffed8c823fc01c12ef5f06d70ee33d3b099b2ed545610d7b18492ebd9
SHA512a63b5c5c38296461b4e7648ee88f34414ca86c8ebbfe63f147b4087b1a6b38b6fde2a4a32ea60ecaf36df0efcdbe676304065a870b92d4bfa194c79298fc3bd4
-
Filesize
9KB
MD549f4e60539e669b1e21ff8d8a71e7f7f
SHA1e66d9ec6bf39a0142947a5c7cd6fb263d20aeb47
SHA2564a9aa5d6d9d0fed035cde0b6d823651345a4552579d0f527af1d0f90bf05b606
SHA512f6d46b6ef23cbdcfa94f38993840a997890e812d54058123038cefbc7790d6aa29eb37674ebd8f5b98d12a84fdc8becf1fae33f6fe34ea738b429aa6b86807a9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD5d82d7316092ca46b26976e7b5cba4e60
SHA16982987bc94475078841b1c7c9a6e6466ceb6324
SHA25608bccf8ab89e6de71802f78146fbcd4a74515688ba9479d471bd84ec7b9b904e
SHA5128e40c0c1548a0e2e8454a8074a2c6783fab2b9e3e5ea63153f12f2aca7391afcc1668531494e6758a9d461f9dbc3ebc73662daea16c8386bfa38f60671011d00
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e