Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17-07-2023 14:37
Static task
static1
Behavioral task
behavioral1
Sample
mxp.pdf
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
mxp.pdf
Resource
win10v2004-20230703-en
General
-
Target
mxp.pdf
-
Size
76KB
-
MD5
b649f9db1184e06cd8a0a34e9ea67df4
-
SHA1
25157a7d6eba79a10dabef649c88f4388f42172c
-
SHA256
a70cd2882308ea6469e53a1f56fd83b63fbcde1f9103d6d9c3634380b9d66f6b
-
SHA512
d338d5b78101325a79b5a9978c2e926b97af5bbe70b4b593b90f03e802abe55d6c051ce5b86545045078389221a2f5e61e538d7c686892d4387c96b6e6e6ac77
-
SSDEEP
1536:khBGowHKlRrJQhXWZJcbytQNgqZEKLO7zLAYzp7dQDKAHzo:k7riQRrl2wjoOIip7CKAHc
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 4948 AcroRd32.exe 4948 AcroRd32.exe 4948 AcroRd32.exe 4948 AcroRd32.exe 4948 AcroRd32.exe 4948 AcroRd32.exe 4948 AcroRd32.exe 4948 AcroRd32.exe 4948 AcroRd32.exe 4948 AcroRd32.exe 4948 AcroRd32.exe 4948 AcroRd32.exe 4948 AcroRd32.exe 4948 AcroRd32.exe 4948 AcroRd32.exe 4948 AcroRd32.exe 4948 AcroRd32.exe 4948 AcroRd32.exe 4948 AcroRd32.exe 4948 AcroRd32.exe 3492 msedge.exe 3492 msedge.exe 4556 msedge.exe 4556 msedge.exe 2820 identity_helper.exe 2820 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4948 AcroRd32.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4948 AcroRd32.exe 4948 AcroRd32.exe 4948 AcroRd32.exe 4948 AcroRd32.exe 4948 AcroRd32.exe 4948 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4948 wrote to memory of 2304 4948 AcroRd32.exe 86 PID 4948 wrote to memory of 2304 4948 AcroRd32.exe 86 PID 4948 wrote to memory of 2304 4948 AcroRd32.exe 86 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2968 2304 RdrCEF.exe 87 PID 2304 wrote to memory of 2396 2304 RdrCEF.exe 88 PID 2304 wrote to memory of 2396 2304 RdrCEF.exe 88 PID 2304 wrote to memory of 2396 2304 RdrCEF.exe 88 PID 2304 wrote to memory of 2396 2304 RdrCEF.exe 88 PID 2304 wrote to memory of 2396 2304 RdrCEF.exe 88 PID 2304 wrote to memory of 2396 2304 RdrCEF.exe 88 PID 2304 wrote to memory of 2396 2304 RdrCEF.exe 88 PID 2304 wrote to memory of 2396 2304 RdrCEF.exe 88 PID 2304 wrote to memory of 2396 2304 RdrCEF.exe 88 PID 2304 wrote to memory of 2396 2304 RdrCEF.exe 88 PID 2304 wrote to memory of 2396 2304 RdrCEF.exe 88 PID 2304 wrote to memory of 2396 2304 RdrCEF.exe 88 PID 2304 wrote to memory of 2396 2304 RdrCEF.exe 88 PID 2304 wrote to memory of 2396 2304 RdrCEF.exe 88 PID 2304 wrote to memory of 2396 2304 RdrCEF.exe 88 PID 2304 wrote to memory of 2396 2304 RdrCEF.exe 88 PID 2304 wrote to memory of 2396 2304 RdrCEF.exe 88 PID 2304 wrote to memory of 2396 2304 RdrCEF.exe 88
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\mxp.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=3C0E46E1D0A09AA6626779515215AEDB --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=3C0E46E1D0A09AA6626779515215AEDB --renderer-client-id=2 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job /prefetch:13⤵PID:2968
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=91F0B321BF91C34BA089290D5A9A77CD --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2396
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=B13B5540CF778B92F7D90EABD1061100 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=B13B5540CF778B92F7D90EABD1061100 --renderer-client-id=4 --mojo-platform-channel-handle=2172 --allow-no-sandbox-job /prefetch:13⤵PID:4164
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=83B9D8ED4858E85081AEAB8A9449D5B0 --mojo-platform-channel-handle=2564 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4756
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=57A82525B55F18FBE9F5EFA192E89625 --mojo-platform-channel-handle=2064 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2924
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=4C9B35FD09A6E4E0B91E270BF52FB3F6 --mojo-platform-channel-handle=2616 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:5104
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://axobox.com/vt/wp-track.php2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4556 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ff901e746f8,0x7ff901e74708,0x7ff901e747183⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,12109161827102337532,10361628618994975376,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,12109161827102337532,10361628618994975376,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:23⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,12109161827102337532,10361628618994975376,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2488 /prefetch:83⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,12109161827102337532,10361628618994975376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:13⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,12109161827102337532,10361628618994975376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:13⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,12109161827102337532,10361628618994975376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4476 /prefetch:13⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,12109161827102337532,10361628618994975376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:13⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,12109161827102337532,10361628618994975376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:13⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,12109161827102337532,10361628618994975376,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:83⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,12109161827102337532,10361628618994975376,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,12109161827102337532,10361628618994975376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4352 /prefetch:13⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,12109161827102337532,10361628618994975376,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:13⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,12109161827102337532,10361628618994975376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:13⤵PID:5160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,12109161827102337532,10361628618994975376,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:13⤵PID:5168
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4336
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
64KB
MD5bd5ce5995826880816d6415a9cca6006
SHA1278b5dd874fdeb197126d09b38f3f779d8895d33
SHA256bd7262afe310f35dce03363c7bcc83dfdb62bf17445c907d366bc324b4ad405d
SHA5123ee057e9a4d66a1336aeecb32d877d64a41b1c18764c9b5ebf9f8bee4ec64f7c98a78b296202b76fa093c0d072d7e40394225fc57895c0548580c3d13ace119a
-
Filesize
12KB
MD508c0bbc29c6a9016148034aaab1b7f5c
SHA1b79b8554e6a19d16767312e9f70ebb1eccd1e27a
SHA256e8f5877098f6b165d724e76242a8b2849f35f4574ed3505aef222ded488954c3
SHA512778f95021d1b3114d915719b54408821fcfb7b1fc760caf30baca9b302e4c035b3fbad116dd4ef8230cd409559f48b753bca3a49635f34e85faf6b5d33a8d78e
-
Filesize
152B
MD58411007bafe7b1182af1ad3a1809b4f8
SHA14a78ee0762aadd53accae8bb211b8b18dc602070
SHA2561f274d0d144942d00e43fb94f9c27fc91c68dce50cd374ac6be4472b08215ca3
SHA512909e2e33b7614cb8bbd14e0dfff1b7f98f4abbf735f88292546ce3bfa665e4cb5ee4418561004e56afc5dd30d21483b05f6358dad5624c0dc3ab1ba9a3be18eb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5c54c253a42106cf5346f952ef4f1901a
SHA1ddf701f7045080439c44d8b9afecfd7213a0420b
SHA256beb99a2e480f096d568f2780f9e541e4cac510832d9ca816f370456c1e9ac0e2
SHA51292cb76a662e0694df1fa50881263e3fa83e8bc5210da411879282ed1f745c6865304efabeff36f9cf3ae11b55d4aabd157079cff03bc9ab0c33ae7ce29357d6d
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1017B
MD51206b429c26fd02b62d7300fa97e0cb3
SHA1c729514303cd12d43621b808f29f249cff68926e
SHA2566f246c7348219efd130c014f39ea93a224af206fd4bb326e54a9f4ed6e564f7f
SHA51250133cc671dd279d13e14e56efb406dda5108118558971fc081274db95ca2864d2630a44dd4ea694ac1e9d494f6c712b206fcac904716751e9e27dfca11b02ba
-
Filesize
5KB
MD50e048b97e7fea6d7f58ea332c0cbd418
SHA1656f167a50d8fab363aa2eafec90d7cd88ffa2d6
SHA256e07158deb40b3e88a017cfce1f0443c546769bf7ac13f41ef81914f4f4df4b08
SHA512c10d77538b95342e676c61e86e21fa8faa2a26341148b64f154378cabfaeeb220aadef4aebedc62ec70304805d9b52f494dc3696a8295f2ecb56700df5040add
-
Filesize
6KB
MD54f60cfaa852edad3b824cb46c0cdcf23
SHA1de999f6c8fba87d8e09c79e20967a7229dc7e3c0
SHA2568acef47c10a90003b42671ff5c375c34909cb960fee9d5a1382fc6068a84da90
SHA512c486652b0f668d923cffe2a224d8c7d00e9db4e2fd9197777090f7f303b032f054d677ae46ce6a906331233389e6eebd38070af08c644a254ddd0ab9d9b6f605
-
Filesize
7KB
MD5534edde2b2ef3174db9761f1389bfd61
SHA193f9129852cfd7c8bb81237062bbfceb43732f20
SHA2568147c68eb390987bd019faa0c0b2f15e2ae67c442e0d6fc6c3bbf15e4442d485
SHA5127793023f71021a91c1e45f7cc8d6fc85da717657a02413ad0de8b77b1e2c1f200364c16433de21ece71cc85568842f044e2bce822c2d33d643c8a77023a4e784
-
Filesize
24KB
MD58caf4d73cc5a7d5e3fb3f9f1a9d4a0cc
SHA183f8586805286b716c70ddd14a2b7ec6a4d9d0fe
SHA2560e0c905b688340512e84db6cf8af6dbdfe29195fefde15bd02e4917a2c5fda8c
SHA512084ef25ea21ee1083735c61b758281ba84b607e42d0186c35c3700b24a176ada47bf2e76ed7dadd3846f2b458c977e83835ced01cda47cdd7ab2d00e5a1a294e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD57aa354a52850a90bb7a05b036c9f2f35
SHA19ee2c559893a611a058950411d5f62a7771d2217
SHA256a590aa071efb81fab5a505b46e13fe647bd1f5594a36bdee47f2bead5615e746
SHA5123959272841bc4ec30821064c1a7ac65360af984e928fb65fc2061877b44563556c2e313910a7f86d33dbf190ca79ece97b5e2326d78d59dfdc7084cb470fd29f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe58e00a.TMP
Filesize48B
MD5cc86722d7c96deaf69171ed05861b3ff
SHA18d8b00a79d434ddef40afc38431995d3a0b73970
SHA2563f2f098f2a56977fc336cf8c8c700ec70bddb3ee580550e74771f97a8f1d75e7
SHA512fa51c8fe82354cc496ddef2135fad6ac458ebd311ec8d4f3ef69236849d6cc6aa91b83e781fc56104341912f3e98324c1ac068cd03a634bd0fe2b31440bed282
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD53087f517ab727086821ba441016a3592
SHA13eb9a47f0c596f97aee8f6a3ccce28c8e3cbaf0f
SHA2562cdd1dfad1ef676fa516684f2b9244922ddceae77117577d38ae804f65a3fbf1
SHA5122a6182d61a63b112d3ffa86ba1bae2f36f61860f9b0263c746ac0ba96eabb3b9d360b427c731cb0c89531d4e808d24af7653ca1e4f0d8ec8df50842c1085db20
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e