Analysis
-
max time kernel
115s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2023 21:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/uc?id=1ZltzC9Rog9ueKtSUK_bNmvKBPHH804_W&export=download
Resource
win10v2004-20230220-en
General
-
Target
https://drive.google.com/uc?id=1ZltzC9Rog9ueKtSUK_bNmvKBPHH804_W&export=download
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 2 IoCs
Processes:
setup.exedescription ioc process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\2d3d4b6f-1e1b-45fb-977e-cb2911b23fe5.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20230601235142.pma setup.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 9731bf4db045d901 iexplore.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\RepId\PublicId = "{95FA0B52-A1DE-4F3A-BDF6-BDFD1AC1E5EC}" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0064503e494d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00755b03e494d901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Internet Explorer\RepId iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{2860E188-00D7-11EE-BDA1-6A765FEA1DF2} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4256997381" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31036644" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "392428439" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31036643" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000458becf94f192f4c98f9abcaf6b334a10000000002000000000010660000000100002000000050d67b486dff58211164706fb9b482d4049674cde9f40ebc515be340388f662f000000000e8000000002000020000000d053454a01eec9f0fcf2c609fc62706093a2edf7a174bb0b1ea5086472ccb0d8200000005c9b0148733c5ddf5a1039a69f268903f175be7aebe11a793747a9276e152b3e400000005273cd25bdb9084d52279e2bceb25c91ca56da7ffb367670c866d054e137b724cb201904dcc6d1c5565d77064b0251c44115ea4f097bc3408adce0e598e90922 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "4256997381" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31036643" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "7729633" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000458becf94f192f4c98f9abcaf6b334a10000000002000000000010660000000100002000000081904fa1c0d0a19ecd9311cbc54f24346009727af470b3e7ebbed47e17614bac000000000e800000000200002000000083f355cc409f38be8f8e6638586ce265f612b1b8799680c8d7d4b6f9d830ecf4200000007f3948790f824b7de061a5fc971d67b51f11b00a9b59c9d9bbc9e4e21c6a7fbf400000008b1520ae917c9e0dd060069e9023decaf1dd0e7e52f8483bd7d3f5e7ce7fa4cf44fd91a53d52a3cc7bbd63f3076c62ab0ab97e44c89027681be2e5e3937c2b75 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exepid process 3624 msedge.exe 3624 msedge.exe 3588 msedge.exe 3588 msedge.exe 4576 identity_helper.exe 4576 identity_helper.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 100 iexplore.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
iexplore.exemsedge.exepid process 100 iexplore.exe 100 iexplore.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 100 iexplore.exe 100 iexplore.exe 3512 IEXPLORE.EXE 3512 IEXPLORE.EXE 3512 IEXPLORE.EXE 3512 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
iexplore.exemsedge.exedescription pid process target process PID 100 wrote to memory of 3512 100 iexplore.exe IEXPLORE.EXE PID 100 wrote to memory of 3512 100 iexplore.exe IEXPLORE.EXE PID 100 wrote to memory of 3512 100 iexplore.exe IEXPLORE.EXE PID 100 wrote to memory of 3588 100 iexplore.exe msedge.exe PID 100 wrote to memory of 3588 100 iexplore.exe msedge.exe PID 3588 wrote to memory of 3280 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3280 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1784 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3624 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3624 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 4004 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 4004 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 4004 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 4004 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 4004 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 4004 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 4004 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 4004 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 4004 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 4004 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 4004 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 4004 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 4004 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 4004 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 4004 3588 msedge.exe msedge.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://drive.google.com/uc?id=1ZltzC9Rog9ueKtSUK_bNmvKBPHH804_W&export=download1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:100 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\Y624AVVJ\analytics.html2⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffead1d46f8,0x7ffead1d4708,0x7ffead1d47183⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,6295923240471593472,4132398829236403918,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:23⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,6295923240471593472,4132398829236403918,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2620 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,6295923240471593472,4132398829236403918,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2956 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6295923240471593472,4132398829236403918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3676 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6295923240471593472,4132398829236403918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3680 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,6295923240471593472,4132398829236403918,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5824 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x238,0x23c,0x240,0x108,0x244,0x7ff66f925460,0x7ff66f925470,0x7ff66f9254804⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,6295923240471593472,4132398829236403918,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5824 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6295923240471593472,4132398829236403918,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2000 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6295923240471593472,4132398829236403918,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2580 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6295923240471593472,4132398829236403918,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6295923240471593472,4132398829236403918,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2852 /prefetch:13⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
1KB
MD5fd16fa69013cc787e100d554624af691
SHA15a7570689cada51c2e1b6b200cd80bc536344f8a
SHA256fe4d3f632518fcdf79953b53def65a1f5092ce3e907e79e73810a1928f1610d6
SHA512d535daa6b46b79bddfd79a51371ef2ab94e99ad4963851478dca99e2f171e760a460c5f44146724d52bb670eb0115df81156136d9feb03a396b46e056e747b06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
471B
MD5a244894fbc1ca90d08cff32fb6cd308d
SHA159e3c026c3d1bcd549f697b5dd4a35e298c9d2be
SHA256a6b607b594b789a6ab1671c98fe9447509b82a85cfdcf4693b253616568e32ac
SHA512b62e636d9d0e9e67ff310f3370ab1ca66abf93efef89a9a0d6d79e4526d8904a49b01f39ce64b76d3db03ac7080f62a84caabfbfc7bbf0244e2601457ca7e09e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
410B
MD5edd6624f74ff1af4851ca37b6e5ebc87
SHA179e3f4bf2115b51245fa1bbe33487ee3cc559379
SHA256bb40064f832027c02b8716f5a090218e60ec168d12351a307785a7d4330af07e
SHA5127721b0d13b4a683b4d6e2d17e7b309bc2b7a52160109fdbcadcd9ef552c0a19d7e2e0db8a7e8ebca3be6a9e96f2667408303b9a149f225277487941de3cde671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
404B
MD523cd46e1fed15a30ed652a7f686f51db
SHA18c18829a3f313a01e7076739a9bafcd7540eeb01
SHA2567598f7a5010f2afd319444f4971a9ca395ff079adcc180bee7c80528edaed6ec
SHA512176bcd19497c0d39672ea75576ce3de985b7f16abdf41572ab1ddf743cae2b9193942278a251e84884f62d3b66e3a3f6f25eb5e6ec197097cbe744c2cfcc3184
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5b8c9383861d9295966a7f745d7b76a13
SHA1d77273648971ec19128c344f78a8ffeb8a246645
SHA256b75207c223dfc38fbb3dbf03107043a7dce74129d88053c9316350c97ac26d2e
SHA512094e6978e09a6e762022e8ff57935a26b3171a0627639ca91a373bddd06092241d695b9f3b609ba60bc28e78a5c78cf0f072d79cd5769f1b9f6d873169f0df14
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD591fa8f2ee8bf3996b6df4639f7ca34f7
SHA1221b470deb37961c3ebbcc42a1a63e76fb3fe830
SHA256e8e0588b16d612fa9d9989d16b729c082b4dd9bfca62564050cdb8ed03dd7068
SHA5125415cd41f2f3bb5d9c7dadc59e347994444321cf8abe346b08e8c5a3fc6a5adae910eda43b4251ba4e317fbb7696c45dba9fd5e7fa61144c9b947206c7b999c4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.icoFilesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\MANIFEST-000001Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\data_1Filesize
264KB
MD58a9c5f4d182fea3c40ebebe81042a6ee
SHA1f27bcde6a8caa901fa4635cade34995cf22866d6
SHA2563679cd570fb3411e5f843e4a05c065a7044fb7f23f2fa2a2ad3fbb36a09d1714
SHA512344758c1efcaa37ccda7af8df0ad6ddd59af5ec92f6bd9e84cdc824e7ed49479c438f8d14e5d294514c6597fdcfebade4a706e420a971c3f2687fb74ca4291c1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Microsoft Edge.lnkFilesize
2KB
MD5199d73540dddf5b6fbbeb7d1ac1f153b
SHA138eab6b883aa21d4f1beac8706028ec15b74fd5e
SHA25681a01d931cef044f93423abb3550c7b2af57467e89e7eb2669066856be6d7214
SHA512c069c6bb5b0a38d4e04b98839d8bd76d8fce1f1519f6a486f3eb9cf5dfbfc0bf875ec2a1e5c6a8f775f5bb78def5aec0a22bbfd42da145117b548207504a76fb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
628B
MD5e32de3994852a6c133ee160aa580c440
SHA1df94f83ce76fb578617d92c682d208f680bcb962
SHA2569def88e0a5dd05ceb6b4d7f4de5f35734c85043699771b87017bb8daeb6a2bed
SHA512f5830904cae1588d7443f1b9a066ae5d008145d5d12f09da22cff1a81effcad6e812837f62ed3176a577a568d31e0989b2e19daf0fb79703939eaf45497dabe8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD535ec55b0a36feec63c8393b8de75e7df
SHA15def3f89c78d053407f4358ca052fb76718730b6
SHA2566b37492c6676400b6c23db9359f8ce94bad46fb906eaf8e9f7a81063177adb1b
SHA5122ea90d4e400f4094429e7ddd233e0dac813bd891630e39ece963322f9380b3657f56ea1d73334b39511ec0635b94cb168d31c8a2c7733622075048613b6c694d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
4KB
MD539853a4ad68d586f1e3710a753cb59f9
SHA1801916cc57074a4cdb8f914661c299338cf9eb2d
SHA256d8ac194b204db5d04869ae315e4d46fce28589ef5d96c742f97c280118955f3a
SHA512fbab2a06e0760c2d99a0231ea32f74097c5e072fbca41a1100c4f20108a46fe8b9d9a7387af1c2608c195066589fe0e21334adde8d66f3f0beb763b381a26cbb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD58a6b5ff6e00dbd6cfa82051f6c2677dc
SHA1a060532e3a5f811d1fee729d497e923c7feaa2aa
SHA256ef713957d6e06e9606c92e9f70a05460bd730302461ba1e8bece7bd53e0b50e4
SHA512e0af71016ced0220dd6656270a406070311a1bb350d9027b897eff36d468ec7c13182e3d76f9f0c1e54d9696791ce88b9f2b5ba9ad6103f437d8225f159c82f4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD5dced14c09742ec9876cb9bb03688a1b9
SHA16b9c1ac68d4b7c34b32b66a8cc9e08211fafab84
SHA256b77bd95aa980bf6f6085daff55833fffb45ee26f63dd36b85807e41d3493a267
SHA512d053717d77308b6ad3abe427d673ed09d4a351b1ba24d2a4765fa70bf94cb0d0ff7fa7263209e734cd6f898b55ac2f03be42bbbb9354ac364d849b7a8b9cf779
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure PreferencesFilesize
24KB
MD560b345592703258c513cb5fc34a2f835
SHA139991bd7ea37e2fc394be3b253ef96ce04088a6d
SHA2567e358b4f7553c9385e8eb2c5692d426bc257bbd4c0213e6c69294459734f6300
SHA5120346fb4096eb285ab0fdf7e7ec38c4daf7bbb0c506f09975eb2290121d169a34c886fca342c3e06371cb697f2753a697ca4f72af7817ed340eee6063897110a5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure PreferencesFilesize
24KB
MD51e5ba0451ff36f3ea9e13836ff06ff26
SHA129d9432a220b56a8aff2ec973bd6006dad895117
SHA256be939c53dedb05948868aab0d04a7a31d9883884262e1da601e23cf95ca80951
SHA51210247ac659e1ad79d1984e617f9ded79cbddfe9c69177968f385729cf7d934c3ca82d4da8ad5dc025336b2ffdb0fbb7629fc0c400896304a5a71a001d030ee9c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD543b1e47eb635e86e7708f42b55317571
SHA1d301c4d4c5b9369da50ae5104dee6ac368999a59
SHA2562eba624274ebfa569c835a46335c4f59cb52c866199e7076b70e42d8caa8637f
SHA51219182e503fb848e95e5c7ee82b58602faead32ec484faa1e34621a780bc109207151e6d9e5ec6f5ad349cc6b21ba0391dad1ede4ea0fdc28561022128ca8235a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD54577a6f355b9c5af22d8b891ab7475e6
SHA1a324e345bbdbdec8fc832c98107b8df72e8744af
SHA256db53d641668db7ce76880190d514c915146c569094b11cfe71f1008de7a750a3
SHA512d5f54365cd01c00c77bf67f5358dcc2809335ac601e5f7e0b8433e0222767d8c5c77170e9e31f771cc4e7403f73e891494fe2f4d14bb6e60d679ed8c8a73c59a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
9KB
MD5de31695a1ba489c3b7a42a91c2f3a369
SHA1685e11bec1934e083aacec2252cbc79a6bbd1cf7
SHA2561dc16e44be00b4431e1f7eba4cfe96d0a0e93e4d51a571fa689a06fdf705e521
SHA5126faa7bab3c0ed4e161436207cdf1cd3fd4e91a79e22e95bfb2876fcb095b2abe349afba20a6994b1abc77c6c5112997f369fc01df580f1725b7579b7ed41f526
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\q7s3h6i\imagestore.datFilesize
1KB
MD55ea5071b1e411b50f64283d4aff20065
SHA1906891fd05f46ad383b08410e5171f6f4461c75b
SHA256292c3a5515463d5e8722451747a8e8e24db62ac7491b687e2b47f90b64cd38fa
SHA5121e8c9f3f4a2a0c4ef72fc68fe4818000713fa92604674265bfdd88415639656bb98254dc74bbbfcc748830e5de3adae06f683579070a2cad73be53ff9e5d572f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0BMP3ERH\drive_2022q3_32dp[1].pngFilesize
1KB
MD5c66f20f2e39eb2f6a0a4cdbe0d955e5f
SHA1575ef086ce461e0ef83662e3acb3c1a789ebb0a8
SHA2562ab9cd0ffdddf7bf060620ae328fe626bfa2c004739adedb74ec894faf9bee31
SHA512b9c44a2113fb078d83e968dc0af2e78995bb6dd4ca25abff31e9ab180849c5de3036b69931cca295ac64155d5b168b634e35b7699f3fe65d4a30e9058a2639bd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\K941J8ND\analytics[1].htmlFilesize
1.1MB
MD59a0c99d31a057080fcf68a6aa6d1a686
SHA1beff0107b0d10fd0fd30927d5aea5199522fd517
SHA256eaecf06e187e71d2da840a3732b34fddd6e3ce5778cbd3459ae4949947c5728b
SHA512aa60c8df82cafa272d89639342d1a7688a45a1bfbc369c0a10e9f3d828ab97bf9c7db1009619803b9b5a48de69df46f5346194550a90fda9e76bbd257c94a309
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\K941J8ND\suggestions[1].en-USFilesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\Y624AVVJ\analytics.html.taz9eak.partialFilesize
1.1MB
MD59a0c99d31a057080fcf68a6aa6d1a686
SHA1beff0107b0d10fd0fd30927d5aea5199522fd517
SHA256eaecf06e187e71d2da840a3732b34fddd6e3ce5778cbd3459ae4949947c5728b
SHA512aa60c8df82cafa272d89639342d1a7688a45a1bfbc369c0a10e9f3d828ab97bf9c7db1009619803b9b5a48de69df46f5346194550a90fda9e76bbd257c94a309
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-msFilesize
3KB
MD5ad92699252342321ff1183efab8b0963
SHA1d57645bae55996ca4e24c99013037c01a3c9abbf
SHA2563ee23e355cb11fcda224e225d152d13de14993f82e9a83f4e76fa7fc052f1acb
SHA51288d8b857b3814a9c138ea7d40c964c7c52d2bfbf7d39d1a3a34e220553568346fc38db22433187892428c0c32ac52c05f752213a4dca3e879b8391991459548e
-
\??\pipe\LOCAL\crashpad_3588_VTJNAGWTXUNLCMXOMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e