Resubmissions
30-06-2023 14:51
230630-r8fy6aee6s 430-06-2023 14:38
230630-rzs75ade32 430-06-2023 14:32
230630-rwfsmadd99 5Analysis
-
max time kernel
163s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2023 14:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://veiligheids-centrum.dynv6.net
Resource
win10v2004-20230621-en
General
-
Target
http://veiligheids-centrum.dynv6.net
Malware Config
Signatures
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\095dad55-1be0-4114-812f-f440afc9aafe.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20230630143839.pma setup.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31042400" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bbcc4d706d9277469144fa0d79f40dea00000000020000000000106600000001000020000000612dab46cabbac589aa2fffb2da23609f74ea04fa50ab3fab6aba78f16e1a422000000000e800000000200002000000003067a9ab2ad108ed758fe2d3aeb10d7157b61be465f637ba9272c49db1fa2a620000000d2abfbd28bfdcde3ec570004fc41277cab508c73ce917ba30cfa0896924a8c6240000000f74829d494f81ac836452a634fdf3afdafa431d2066a0f27ddeaf29754114265991f211e91e8435d8e61cb706f7beacbed371add1535c4d405dcf0ff31c50616 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{C0F2D586-1753-11EE-9FB7-CE8372037D5F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31042400" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0a1809760abd901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 500ca29760abd901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "394900874" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31042400" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2510819770" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bbcc4d706d9277469144fa0d79f40dea00000000020000000000106600000001000020000000dfd3584a72413060d868c0da43f8bc5fad1a40db5f829319d4240bfc91d1ad07000000000e80000000020000200000007b194de065df7a90cefb7deadf5fe80dda0014dcae01e1a12eae2ba061b00dca200000008785671ad76ddf44ab3c0eeead8c344e2ab08bcc90cccbdfd2906f2ff74d3c2f40000000dfcc9ae335352972ff8f092b42eadf17946bbc66da8189d69444543826f7092f7fd851d85ed8100a1c132f3a7c97118b6682843328f84f4d016748aec673518c iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2520717041" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2510819770" iexplore.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3100 msedge.exe 3100 msedge.exe 3376 msedge.exe 3376 msedge.exe 4964 identity_helper.exe 4964 identity_helper.exe 5528 msedge.exe 5528 msedge.exe 5528 msedge.exe 5528 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
pid Process 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 1084 iexplore.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1084 iexplore.exe 1084 iexplore.exe 1384 IEXPLORE.EXE 1384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1084 wrote to memory of 1384 1084 iexplore.exe 83 PID 1084 wrote to memory of 1384 1084 iexplore.exe 83 PID 1084 wrote to memory of 1384 1084 iexplore.exe 83 PID 3376 wrote to memory of 4828 3376 msedge.exe 94 PID 3376 wrote to memory of 4828 3376 msedge.exe 94 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 2320 3376 msedge.exe 96 PID 3376 wrote to memory of 3100 3376 msedge.exe 97 PID 3376 wrote to memory of 3100 3376 msedge.exe 97 PID 3376 wrote to memory of 1668 3376 msedge.exe 99 PID 3376 wrote to memory of 1668 3376 msedge.exe 99 PID 3376 wrote to memory of 1668 3376 msedge.exe 99 PID 3376 wrote to memory of 1668 3376 msedge.exe 99 PID 3376 wrote to memory of 1668 3376 msedge.exe 99 PID 3376 wrote to memory of 1668 3376 msedge.exe 99 PID 3376 wrote to memory of 1668 3376 msedge.exe 99 PID 3376 wrote to memory of 1668 3376 msedge.exe 99 PID 3376 wrote to memory of 1668 3376 msedge.exe 99 PID 3376 wrote to memory of 1668 3376 msedge.exe 99 PID 3376 wrote to memory of 1668 3376 msedge.exe 99 PID 3376 wrote to memory of 1668 3376 msedge.exe 99 PID 3376 wrote to memory of 1668 3376 msedge.exe 99 PID 3376 wrote to memory of 1668 3376 msedge.exe 99 PID 3376 wrote to memory of 1668 3376 msedge.exe 99 PID 3376 wrote to memory of 1668 3376 msedge.exe 99 PID 3376 wrote to memory of 1668 3376 msedge.exe 99
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://veiligheids-centrum.dynv6.net1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1084 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd2e9346f8,0x7ffd2e934708,0x7ffd2e9347182⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,10129662356108701413,2824855579260174318,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,10129662356108701413,2824855579260174318,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,10129662356108701413,2824855579260174318,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10129662356108701413,2824855579260174318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3552 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10129662356108701413,2824855579260174318,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3660 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10129662356108701413,2824855579260174318,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3084 /prefetch:12⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10129662356108701413,2824855579260174318,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4016 /prefetch:12⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10129662356108701413,2824855579260174318,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3060 /prefetch:12⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10129662356108701413,2824855579260174318,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3064 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10129662356108701413,2824855579260174318,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,10129662356108701413,2824855579260174318,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3060 /prefetch:82⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings2⤵
- Drops file in Program Files directory
PID:2028 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff661cf5460,0x7ff661cf5470,0x7ff661cf54803⤵PID:2064
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,10129662356108701413,2824855579260174318,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3060 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10129662356108701413,2824855579260174318,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:12⤵PID:5332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10129662356108701413,2824855579260174318,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:5444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2100,10129662356108701413,2824855579260174318,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5736 /prefetch:82⤵PID:5804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10129662356108701413,2824855579260174318,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6508 /prefetch:12⤵PID:5896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10129662356108701413,2824855579260174318,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:5884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10129662356108701413,2824855579260174318,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6672 /prefetch:12⤵PID:5696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10129662356108701413,2824855579260174318,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6780 /prefetch:12⤵PID:5684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10129662356108701413,2824855579260174318,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6896 /prefetch:12⤵PID:5312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10129662356108701413,2824855579260174318,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6504 /prefetch:12⤵PID:5384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,10129662356108701413,2824855579260174318,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5528
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4944
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD560fe01df86be2e5331b0cdbe86165686
SHA12a79f9713c3f192862ff80508062e64e8e0b29bd
SHA256c08ccbc876cd5a7cdfa9670f9637da57f6a1282198a9bc71fc7d7247a6e5b7a8
SHA512ef9f9a4dedcbfe339f4f3d07fb614645596c6f2b15608bdccdad492578b735f7cb075bdaa07178c764582ee345857ec4665f90342694e6a60786bb3d9b3a3d23
-
Filesize
503B
MD5f51cbbcfabf41c45d03fce98c51d9efa
SHA145a3f1dba7907f4104510e6e076a01580b06eb9c
SHA256f1a04d6bde992fd9b3441001feff609d1d862fef62e71765a475b3fb26844e54
SHA51201993c460ce291c0433c0556d9ef2a6e27e8349dd4fcdfff668f97f294148f127bf64c92c1ae8679fe32c1e3963c43565b90cf868d90f4620efebc843c3e9079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD58bede84e7f7a0fc8a81d0514c5aceb17
SHA1d0851b353666c30e6a62080442a40b5ea2ea6832
SHA2567328c5b47885d616d6fa7e03d1feb377a5bbd2ba79cd11b503d28bb98a1d6ddb
SHA51248d59b13a0c7023ebc0d2df8b00446c11d88e67cecd56b5864850d7463fd79c5e2247104d1fca5be2daca41ded88a2cecbe18262a72c5e5151a07abd0f8b261c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6E3BE2E7273DD3339272753F02B8806D
Filesize552B
MD55eb01debb0a01266dfcb7eaf1dcec842
SHA1ed9d3b83498f5be5302902ab46af5d2b297cc581
SHA2560c9af081c7db6fb4d4a8a111a6ee3fe7dd93727b488cb147be7d4634cee72670
SHA5123c845d12a5f6d5b8b37f66bd3d400c82a395783219f2c84ab38d14ba2ad2aa6d88d3872b49ccf8f0f6cbf765b1fca6fb936bd8afe805bc834b179f5b1b0d2037
-
Filesize
152B
MD5cb62f344ad026c624f757eeb452e2ee2
SHA169d135731ecd414f7f7b1ed5a6d4a6e4414dce92
SHA25661cf4c2a79753705e6ecd28867b548115e83cbdb76a5a124849cd094635d2d6a
SHA51250318f97a2fae97f9483d1eb87b4cb8ec3f22f22f21749f375ee3210ad8ad1c3929f8afc60fcaf19d5fc2c4a8420fb0da5787744c589b25f70ff763c6abfcb6d
-
Filesize
152B
MD5ab6c60116611221845298123c757197c
SHA1f90ee239579b1c40697c32ea688390ff9d777362
SHA2566f72e30896b7ac428f722bf30ef27bf005dff5c9df0a210c05d3077a86a67b2f
SHA512481b8743f7835acdc7463638b584be281e4f99d6b457a50d4276b19ccf151373a7fd2287c51efea2c1335a4263694aed330b5c41313f76a9b149171364e28a3f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD5a5c0de1a5552cd56fcb3927ad980a3aa
SHA12aebf33d10be1085976e307bc8573610285b2d46
SHA256e68e98c79c0ab677ee2df624ee1966de7f97bbde4e465f66153a7b23eacf66ae
SHA5125eb12d0bbcba445acee16d267c7c2873b728eddbf3806f0b7f3a6476fe0fa37a87ed6b2d7f0756aa35f817712494038c406fb7f9bdacec94cf83f10140a352e7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize600B
MD54e05081bf30c8d3968267e9537727eeb
SHA144e4ee62643e186f9fccb63617925322da453d0f
SHA256e76486e363870451b0eadf2310eb51a1e16e275c06870229fa7afa5e1993f5bb
SHA51237f0e14795fd22ca7b7e0f5a58dd6527e880ae5b96e87426658ebf204a43285c6877d6487b540a2b2ed7364ca6a10591f4ec443c8841d0da7905b65f66c1bab1
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
2KB
MD56358a42f10553971926e2a7e457964e2
SHA1a9f56e88e47034261b604b06ac89bb2cb4e51e7e
SHA2564fb4f5142871316e4db2978a00e416727027996d2caf6064df7959808bbe8347
SHA512690f76d20af7e23eedd09a3e36b46640298c001b4cf65da86b79911960a3f8e8bfc86f06828f515e51f4f420fa59b66ee2752701a3873e13961590a7cf222b18
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
971B
MD5045ea670c2858d4ff4beb5c44d7c19ca
SHA1b5f7bcdfbc4e73ce26e5a711fee28e4574a50f65
SHA2561c861aca237e298d0dc35c89d34d2e30fa9c8c5e02d467c5523aea3e2990e912
SHA51279ac1d2e0a895d33e92d4e480b5b2f421f0995f8e3d6b1624bd6e32be30c8a26324dbab54fd84f51dc513236de5a0eb4b2805188671b83e72a8ef191ec23f084
-
Filesize
4KB
MD52c32f8be611a861f4e54517969109024
SHA1877cc21dc7e0c3f569e9e3d40f055ff2d6171dc8
SHA256e32147349440a4f7a23279f0db5ab8249051561732f4731ba74c07c38245218d
SHA5123caae10265ac0aed5ff4754eb57ae136fe19a0425bbe751e59c97b34295a5d7e3aedece4c5eb1dc3049e02ed4ccacaaf43c238cb4399adc441417016da6bfa01
-
Filesize
5KB
MD54c3e24442e0e5cc2054af37dc9813aaf
SHA133f3d359151e1db721f804a667fea1e712ea2cba
SHA256b3abce87b1eaa328dcc16cfb663758a1610899548e904bca60a70dad2858c438
SHA5128ed7dedc9810dd10fd6e5748c0d2c1e910faaa76b8d545c55d7acc007c8fe65785e2371c576c0bd74f86a163bfd44cde83db177996e6f193078dae4c9c8a1cab
-
Filesize
6KB
MD540baa0bf6523342b0a219874b9473465
SHA187ff33dc0baec0f3aa8fc936c645615088a628b7
SHA2564fc96e673064af2cf4a9f51cc158cf88bbe5819a6d525e4c1f5dc4001b684361
SHA512bc7a2f506c0cbd3e7c39ec083de8ffd008e6267c8019158ef58d473f00ebec074df799f9294990b5af68f04a2b72a573fa2462159db349227c61255530e58045
-
Filesize
24KB
MD52babd6c48369403ceb0e62762ef724be
SHA12e656183c7dee0ae8ae9b5eb361cd5884f694829
SHA2566e45b5ab488834284f859c30331156076d2429fbbb1c7c6bb8a8f47cec0fd372
SHA512f4bd88b94e4dc547811448df8edbd2851026b33916fc80c8b1558511aa381fe5663c371c8c41e03e2b3171cd5c96c3fa0324f8cf732dcb352cd697cc22864b87
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c27313c4-3646-49ee-a4cb-827ef3f3efd1.tmp
Filesize24KB
MD54350790c5ce221003810409ebaf1ab5e
SHA15b6be3ea1e79b347d2d307ef6e74369cd224fcf2
SHA256718d087bd1fdd3695ecbf02fbf119cd2f281a0e7ab03706b3fc5961d5250779b
SHA512aa8011ac7260c485b7d170d5ee48251eb82e592fdeeff9fef4c90643a48c15a6a8caf7f2dd9c5b39e91bc730e1ab206538a94ec06a06dd87de6b96b6ce0a1ce7
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
13KB
MD594e4d2399491e57917cac2248ae89a2e
SHA19090d226ddd811146e0db96c1c97d8c82c315873
SHA256acddfde01a44ef4279a1200bf54f98d0af019d34aaf58984060cdf16bb92d402
SHA51261e9245006bbfbb01ab2d6be2c616d97bc5e4aa4222b5c956cbc96b30eebf19c26f9c051123be093f2d9d4bf287ffde1490ac14431ec4dc22a8dc72279175a55
-
Filesize
13KB
MD53337f13f3f8aaa46231c4d6402e43b3c
SHA1bfdc0c41f2907da8ef5b3c5fb8a50ba93b6fe490
SHA2569e770874c808fb2d6bf2e5c6855aae19a81ffbb0909fef7246d29ae50b5c388a
SHA5123802f3ff84b2f8d5cff995b7a7d750579648545a360f35fbca3a0387dd353585776bcc230d499526a150d9f1e09a55c4e8d11c4b20bff3c41e51dff693f2c20a
-
Filesize
13KB
MD52f057228389cd227fb72664d110af5d2
SHA13d697f9a7da835c6283940bc72960afad50000af
SHA2562185c3b517048c7e21963411cd8ecc9ca63cb87cd06c56cd67f7b8271533db00
SHA51292855e9fd5d1a4fb4665677fd3317992fd6a4cd618ad01e9d7e26344d9acf65cc5716cbb14399ad1b21e69d8975edabae2342d8c4a1075c573a028094be7ff64
-
Filesize
9KB
MD501e7806ed0e3a555a5345bb1b4b1f4c1
SHA1d80cb5812615abe6c6fc57668bccc8f140df9770
SHA256277e9e25352dc3598184d8460cc44bd772f921dd523fd9f24022f4d3b216e75d
SHA512cb5d73818a17fcb9e6c9edc70a434ede0ccfea9634164c3971d6c9557a0772c3e85ac67102b86e2f70472ac72221b36fb3b031b987a16b5a8e2719fb3171417e
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD5e99f210e043efdb6a47b422f364c7b37
SHA1a0b858b9bf4b75f3dfe92da30ae9f8b8b3dbb5a7
SHA2561a22da0d568daf6f3c1de0980aca4266a0737380243731e796c7e504be7433c9
SHA5122fff4a4727e2fb1610975a7fbcec433c9c3ab0adfe8214e53756cff5de335ed9537dc752d36c87328e7ff268b5eb18032c9d537db633d5b3f8c628e067cede01