Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2023, 02:22
Static task
static1
Behavioral task
behavioral1
Sample
Purchase_Order__2204424978.pdf
Resource
win10v2004-20230220-en
General
-
Target
Purchase_Order__2204424978.pdf
-
Size
69KB
-
MD5
37f822a2f51242125e722b11eb7eb30e
-
SHA1
7f7023a0732ee7f3a257222978b13f869e787f65
-
SHA256
612f264a0dcc6e21d1bec93fabe6a2443b96aa1e005cc89094a8b1645dc34a5f
-
SHA512
6141706fbf579c579990d42c1f66e57f2f3a3e06cb3501945938dbd4de303683fa8ebc3466dd8459eed1421811121f6ca03dd13fdf376e9f7381ad33e065017b
-
SSDEEP
768:FE1t4LtoCov9gko45zi2+dMdSGxQITOras2O7KnnX38wMLVlS/HLjRO+BdUAT5sy:+kLNJPk13dbVszd+Ho+vDRiGp
Malware Config
Signatures
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\d375c463-2eaa-495d-8f62-9924437848ee.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20230329022418.pma setup.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 4788 AcroRd32.exe 4788 AcroRd32.exe 4788 AcroRd32.exe 4788 AcroRd32.exe 4788 AcroRd32.exe 4788 AcroRd32.exe 4788 AcroRd32.exe 4788 AcroRd32.exe 4788 AcroRd32.exe 4788 AcroRd32.exe 4788 AcroRd32.exe 4788 AcroRd32.exe 4788 AcroRd32.exe 4788 AcroRd32.exe 4788 AcroRd32.exe 4788 AcroRd32.exe 4788 AcroRd32.exe 4788 AcroRd32.exe 4788 AcroRd32.exe 4788 AcroRd32.exe 2624 msedge.exe 2624 msedge.exe 3416 msedge.exe 3416 msedge.exe 4676 identity_helper.exe 4676 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4788 AcroRd32.exe 3416 msedge.exe 3416 msedge.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4788 AcroRd32.exe 4788 AcroRd32.exe 4788 AcroRd32.exe 4788 AcroRd32.exe 4788 AcroRd32.exe 4788 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4788 wrote to memory of 3236 4788 AcroRd32.exe 94 PID 4788 wrote to memory of 3236 4788 AcroRd32.exe 94 PID 4788 wrote to memory of 3236 4788 AcroRd32.exe 94 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1948 3236 RdrCEF.exe 95 PID 3236 wrote to memory of 1740 3236 RdrCEF.exe 96 PID 3236 wrote to memory of 1740 3236 RdrCEF.exe 96 PID 3236 wrote to memory of 1740 3236 RdrCEF.exe 96 PID 3236 wrote to memory of 1740 3236 RdrCEF.exe 96 PID 3236 wrote to memory of 1740 3236 RdrCEF.exe 96 PID 3236 wrote to memory of 1740 3236 RdrCEF.exe 96 PID 3236 wrote to memory of 1740 3236 RdrCEF.exe 96 PID 3236 wrote to memory of 1740 3236 RdrCEF.exe 96 PID 3236 wrote to memory of 1740 3236 RdrCEF.exe 96 PID 3236 wrote to memory of 1740 3236 RdrCEF.exe 96 PID 3236 wrote to memory of 1740 3236 RdrCEF.exe 96 PID 3236 wrote to memory of 1740 3236 RdrCEF.exe 96 PID 3236 wrote to memory of 1740 3236 RdrCEF.exe 96 PID 3236 wrote to memory of 1740 3236 RdrCEF.exe 96 PID 3236 wrote to memory of 1740 3236 RdrCEF.exe 96 PID 3236 wrote to memory of 1740 3236 RdrCEF.exe 96 PID 3236 wrote to memory of 1740 3236 RdrCEF.exe 96 PID 3236 wrote to memory of 1740 3236 RdrCEF.exe 96 PID 3236 wrote to memory of 1740 3236 RdrCEF.exe 96 PID 3236 wrote to memory of 1740 3236 RdrCEF.exe 96
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Purchase_Order__2204424978.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C0166F48AA528B7FFADFD99086E566C9 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1948
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=2C42D2374F3A43840DC3373DB53C0B69 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=2C42D2374F3A43840DC3373DB53C0B69 --renderer-client-id=2 --mojo-platform-channel-handle=1824 --allow-no-sandbox-job /prefetch:13⤵PID:1740
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2178F2014C947644F9359AAD15002ECA --mojo-platform-channel-handle=2308 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1228
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=1118AEBB0C069BB1EC6060DCEB9F34BF --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=1118AEBB0C069BB1EC6060DCEB9F34BF --renderer-client-id=5 --mojo-platform-channel-handle=1812 --allow-no-sandbox-job /prefetch:13⤵PID:1944
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B5C994002B0DC51392E46A72ABC4FD35 --mojo-platform-channel-handle=2560 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2068
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=856D01CF6094BEC93847CD6C6C63EC84 --mojo-platform-channel-handle=2412 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:496
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.abb.com/Integrity2⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:3416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xf8,0x108,0x7ffdec1946f8,0x7ffdec194708,0x7ffdec1947183⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,16335562622576860764,13319195750542314412,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:23⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,16335562622576860764,13319195750542314412,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,16335562622576860764,13319195750542314412,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:83⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16335562622576860764,13319195750542314412,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3664 /prefetch:13⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16335562622576860764,13319195750542314412,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3684 /prefetch:13⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16335562622576860764,13319195750542314412,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:13⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16335562622576860764,13319195750542314412,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:13⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16335562622576860764,13319195750542314412,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:13⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,16335562622576860764,13319195750542314412,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:83⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:2616 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x12c,0x128,0x120,0x104,0x124,0x7ff6a7c65460,0x7ff6a7c65470,0x7ff6a7c654804⤵PID:2592
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,16335562622576860764,13319195750542314412,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16335562622576860764,13319195750542314412,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:13⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16335562622576860764,13319195750542314412,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:13⤵PID:1340
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4588
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
64KB
MD5f7f027c8457e1c57359d69857d12d2b4
SHA13dbb7d8e074bb01bdff7b3d4eac28f0d48ebac33
SHA256d881aa32e84d6c208b05d37d8dfa1338674ecd46ec00651340e36f77d901f7e9
SHA512f1cd8409fe05db8f09fe668ddfddf3e77a6481ef747af2ae3d5f27d50503e65e70a6c56a412d5f37caccf328178e6057cbb046828998fdcaac5ed467d82708a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize471B
MD538ec2cce9ea6d36e74859b17ce7b5428
SHA192461f6cfc37172157747d07a23783558770e7b1
SHA2568417ae6338b266e92f4ef76b30893ba0c6c9684af77b60981d6e68c4326b5bcb
SHA51255a52d551bcc204cc9240bead4ab408ddb25c700a518c178a99d737c5cf3f3288bddf5a2af383b6d648b696942e653d9f9487634c165ebd9b1272b2d5bb63099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize400B
MD533669a72ccbf9b86397a22ada105e7ec
SHA1ae60414a674ced989f0fdf54a66843cd6ad768d3
SHA256a82e0668c6f4cf71eb489b4f08a7489d439bb8918e8c531fc7389ae554b1a638
SHA51203463728d323babd629dce84168f0273cd4229d9b4466e2ebddafe6aaf0072a29af5f087a66dc51efac06abbe8450b1e4b5c0e61b50c9f1c63119860a8ede11b
-
Filesize
152B
MD5462f3c1360a4b5e319363930bc4806f6
SHA19ba5e43d833c284b89519423f6b6dab5a859a8d0
SHA256fec64069c72a8d223ed89a816501b3950f5e4f5dd88f289a923c5f961d259f85
SHA5125584ef75dfb8a1907c071a194fa78f56d10d1555948dffb8afcacaaa2645fd9d842a923437d0e94fad1d1919dcef5b25bf065863405c8d2a28216df27c87a417
-
Filesize
152B
MD5d2642245b1e4572ba7d7cd13a0675bb8
SHA196456510884685146d3fa2e19202fd2035d64833
SHA2563763676934b31fe2e3078256adb25b01fdf899db6616b6b41dff3062b68e20a1
SHA51299e35f5eefc1e654ecfcf0493ccc02475ca679d3527293f35c3adea66879e21575ab037bec77775915ec42ac53e30416c3928bc3c57910ce02f3addd880392e9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize600B
MD5145fe68b20277ce1eb984e5cf376ad1d
SHA1bfbff4d37617759357735f48800b54ccd57afff5
SHA256b8762ae87ba3a51bc0e255c80c2d86327854eb77dbf7b10a9a3ba32efd7748b6
SHA5126a5a0dc9ac31e92f6d8bbe650ffa3793df1cbc93d0e85cab795f8938a9c5df8b537f699e350e6461e60e84bfc6ec9016627e407c061c32558bde0cccfa08d71a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe580de6.TMP
Filesize48B
MD57be18704c278371dc9192d0adc10f3e4
SHA1b490e77bc0dca85f087502ade93da07de42b36e0
SHA256911c3cb8c74c76430974b700696e606b94f07e3ac3c5f9c4d2b21d5d3d549b02
SHA51217a08a01b429521b7c96b502f8541fb6d8613230fbc1e708142b2628eaa8c882a67c3dd337c0807e0c9967771637483186199bbe55a2b29aae915c975e6ba08b
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
2KB
MD5a91b30c992c74e565a6a22cae193673e
SHA1ca1831628973513296b6ac9e438299f4c5d982f6
SHA256abd4cc7758f8696817d9d9a561b0731f4002754bd381e65afe11ce98bddb0f42
SHA5121dcb5c7da1b4e81b150df92df6747a5544f2580a158c843cbc72aa0d19164f714b7c28e8bddfade6d3d54f949d5d97404f3b4409c020d62655ec85db334c09c2
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
497B
MD5ddd70ac650695bad467108bf75f149e6
SHA10e107a294108daca2c9183a70d39f00032a84e16
SHA256523a464433228306f838bef391d99f93078459dd7be068d6d46abc7adc2a409a
SHA512360e98685336b45a25928d5a161625226b744e04c500647948798d68f0710e22c166662fc78e4598e7856e56ba8446cdc7f49c37386be4d1d062e851a1e03aab
-
Filesize
4KB
MD59367d9473f076a112b7296bdc98d52ae
SHA1a0b859703e320654257fc132034a20b07e1adf8a
SHA256bc61711025783ba13dcf1d5cb6cc7545c2433e1ac3c399bebbbe21fdbca53b61
SHA5123392f25409b876d1e6716dbdbb2f5a6dc64e4e2fd06c663ec27d35b86b35aa6d54fdc415be4324483a1e26e206ddb45302f1893bba4f613da2f83c6e11364e22
-
Filesize
5KB
MD58e6d31199c07e42e213a9dca3dfbb31e
SHA1b3229eee3821352cec79e3f974ba2f6f90a9df6d
SHA25625d69f6a8d0be4c1301be85f65ad28f06857c8d31f6d9bde7d396456a56873e1
SHA512defc2c1352c6da987779508947223d82106f2f077e5270c2653fc313319d8d24028019df26154ac2ab1ba952a2f80632ab231695b5ca23913cc3ac4185cf4054
-
Filesize
5KB
MD597d5b9e7734ffc07f12b3824a09c2d9d
SHA1ff9be31f5d672561825d22dc51b5841365fa38c1
SHA2568298d5628c9f9bd8e6b097d947d061b77369d8805edf5f7b1016a45f54f36a16
SHA512bbb83fa9a4d4d2bb9689afdd5e93ebba9e25dff1b2a61ede90d92196895a763bf64daff93be1defa76451b002f69d37ec3eb306249e6366959c9b78584585977
-
Filesize
24KB
MD5130644a5f79b27202a13879460f2c31a
SHA129e213847a017531e849139c7449bce6b39cb2fa
SHA2561306a93179e1eaf354d9daa6043ae8ffb37b76a1d1396e7b8df671485582bcd1
SHA512fbc8606bf988cf0a6dea28c16d4394c9b1e47f6b68256132b5c85caf1ec7b516c0e3d33034db275adf267d5a84af2854f50bd38a9ed5e86eb392144c63252e01
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
9KB
MD52c2933759399bea5ebb460f4914c23f9
SHA1e6b469f8ee85e805bc393f78db9f214334b95819
SHA2561aea310ea808782b9db307a4664f5085a8ad6d2350ddb471841b884093adfaf9
SHA512679341bcaa79d9e7268a90f8260bb92e952e6b78d47a96ca5637ce8e359116b36e251d7941dadfe1942c6110ea09dbbdc808ad406ab1c38ccb62f1f3d335eae3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD56de8ef5f7db05b582615a3dec6069476
SHA1d9ce07eda3013a0ff63ae57a604a4e9208c739da
SHA2566cf9dce8305fc7c722e7f38033d47f44b2e017f5a1cc5ea4d7fbfaf82d0089b9
SHA512f3b60e5ad7505681789bb7441b20c3ab317fa16aaf7c1db9c455876f94dfe762a858b5bb6aae20f1764633d0571d54cba068d757961c5da2569d1caeb356850d