Resubmissions
20-07-2023 08:27
230720-kcqedsec7w 3Analysis
-
max time kernel
27s -
max time network
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2023 08:27
Behavioral task
behavioral1
Sample
stupid.pdf
Resource
win10v2004-20230703-en
General
-
Target
stupid.pdf
-
Size
70KB
-
MD5
20f8f03e467666e8ca6c5737679cd2e4
-
SHA1
5b49edd05c56cb51afbce7b2279d75e2a3e5e4a0
-
SHA256
a8b1a7679f0ac66d8532c3df2cd21a77f5451356b4eda35011409c90f4298411
-
SHA512
1a2a28bd634a61f502c4c60bcc9787002704c5ed097531f24d93ca36cc4ed98872ae4cf573aaef9fbe1e5ab48ea3717ba562f49d019056193c3e19edc527c740
-
SSDEEP
1536:cHHXzGofzrWr51EbcVDSzxJ2AEdxFPNx9MVx:GLrWrMkDSCndXzGVx
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1964 msedge.exe 1964 msedge.exe 5044 msedge.exe 5044 msedge.exe 2996 AcroRd32.exe 2996 AcroRd32.exe 2996 AcroRd32.exe 2996 AcroRd32.exe 2996 AcroRd32.exe 2996 AcroRd32.exe 2996 AcroRd32.exe 2996 AcroRd32.exe 2996 AcroRd32.exe 2996 AcroRd32.exe 2996 AcroRd32.exe 2996 AcroRd32.exe 2996 AcroRd32.exe 2996 AcroRd32.exe 2996 AcroRd32.exe 2996 AcroRd32.exe 2996 AcroRd32.exe 2996 AcroRd32.exe 2996 AcroRd32.exe 2996 AcroRd32.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2996 AcroRd32.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2996 AcroRd32.exe 2996 AcroRd32.exe 2996 AcroRd32.exe 2996 AcroRd32.exe 2996 AcroRd32.exe 2996 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2996 wrote to memory of 3728 2996 AcroRd32.exe 91 PID 2996 wrote to memory of 3728 2996 AcroRd32.exe 91 PID 2996 wrote to memory of 3728 2996 AcroRd32.exe 91 PID 2996 wrote to memory of 5044 2996 AcroRd32.exe 92 PID 2996 wrote to memory of 5044 2996 AcroRd32.exe 92 PID 5044 wrote to memory of 4616 5044 msedge.exe 93 PID 5044 wrote to memory of 4616 5044 msedge.exe 93 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 3500 3728 RdrCEF.exe 94 PID 3728 wrote to memory of 4924 3728 RdrCEF.exe 95 PID 3728 wrote to memory of 4924 3728 RdrCEF.exe 95 PID 3728 wrote to memory of 4924 3728 RdrCEF.exe 95 PID 3728 wrote to memory of 4924 3728 RdrCEF.exe 95 PID 3728 wrote to memory of 4924 3728 RdrCEF.exe 95 PID 3728 wrote to memory of 4924 3728 RdrCEF.exe 95 PID 3728 wrote to memory of 4924 3728 RdrCEF.exe 95 PID 3728 wrote to memory of 4924 3728 RdrCEF.exe 95 PID 3728 wrote to memory of 4924 3728 RdrCEF.exe 95 PID 3728 wrote to memory of 4924 3728 RdrCEF.exe 95 PID 3728 wrote to memory of 4924 3728 RdrCEF.exe 95 PID 3728 wrote to memory of 4924 3728 RdrCEF.exe 95 PID 3728 wrote to memory of 4924 3728 RdrCEF.exe 95 PID 3728 wrote to memory of 4924 3728 RdrCEF.exe 95 PID 3728 wrote to memory of 4924 3728 RdrCEF.exe 95 PID 3728 wrote to memory of 4924 3728 RdrCEF.exe 95
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\stupid.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0602FC39C345DB6164FC511F3D83880B --mojo-platform-channel-handle=1620 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3500
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=34F554B29491F803CA4AEBEEB6DE80BF --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=34F554B29491F803CA4AEBEEB6DE80BF --renderer-client-id=2 --mojo-platform-channel-handle=1760 --allow-no-sandbox-job /prefetch:13⤵PID:4924
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=EA2969F946D8565059AEE8C80CA1B59A --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=EA2969F946D8565059AEE8C80CA1B59A --renderer-client-id=4 --mojo-platform-channel-handle=2176 --allow-no-sandbox-job /prefetch:13⤵PID:488
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D58298A4AC132CE94003FB63AF5042F6 --mojo-platform-channel-handle=2572 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:976
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=37F97F9303779DCFD4E8A9D852AC2F34 --mojo-platform-channel-handle=1972 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2848
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=02502C6AE1B966F5F1EB57A8286C418A --mojo-platform-channel-handle=2828 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:5188
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.bing.com/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ff4746f8,0x7ff8ff474708,0x7ff8ff4747183⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,11224101127800080493,7694781193881263981,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:23⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,11224101127800080493,7694781193881263981,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,11224101127800080493,7694781193881263981,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2992 /prefetch:83⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,11224101127800080493,7694781193881263981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:13⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,11224101127800080493,7694781193881263981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:13⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,11224101127800080493,7694781193881263981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:13⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,11224101127800080493,7694781193881263981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:13⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,11224101127800080493,7694781193881263981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:13⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,11224101127800080493,7694781193881263981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:13⤵PID:6060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,11224101127800080493,7694781193881263981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:13⤵PID:6108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,11224101127800080493,7694781193881263981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:13⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,11224101127800080493,7694781193881263981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:13⤵PID:1808
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.bing.com/2⤵PID:5984
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ff4746f8,0x7ff8ff474708,0x7ff8ff4747183⤵PID:5996
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3104
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
64KB
MD5a8ba5063294487728b3a339d64bbc74c
SHA1ee279ec50a3375c870cf9dd1b87bce0a6b4894e0
SHA25655ceb98ce5034eae454360feb5c0e7ef4ad380e220d7daa1a64fefaa0ec3e2bd
SHA5122aad7f930d12447f572e3dfef1ef45efbd27ac9ba6153d8a945b1a38d4f760bf169549f3c00e5981c928b18549bd82da3f8f3ca73ce1a868b84931186d4a4c1b
-
Filesize
152B
MD570e2e6954b953053c0c4f3b6e6ad9330
SHA1cb61ba67b3bffa1d833bb85cc9547669ec46f62f
SHA256f6e770a3b88ad3fda592419b6c00553bdadc50d5fb466ef872271389977f2ab4
SHA512eeacb0e62f68f56285f7605963ca9bb82f542d4e2ccc323266c08c9990cecdebd574e1ab304ae08ea8c6c94c50683180f83562f972e92799ebbcfcd8f503fb5a
-
Filesize
152B
MD570e2e6954b953053c0c4f3b6e6ad9330
SHA1cb61ba67b3bffa1d833bb85cc9547669ec46f62f
SHA256f6e770a3b88ad3fda592419b6c00553bdadc50d5fb466ef872271389977f2ab4
SHA512eeacb0e62f68f56285f7605963ca9bb82f542d4e2ccc323266c08c9990cecdebd574e1ab304ae08ea8c6c94c50683180f83562f972e92799ebbcfcd8f503fb5a
-
Filesize
152B
MD570e2e6954b953053c0c4f3b6e6ad9330
SHA1cb61ba67b3bffa1d833bb85cc9547669ec46f62f
SHA256f6e770a3b88ad3fda592419b6c00553bdadc50d5fb466ef872271389977f2ab4
SHA512eeacb0e62f68f56285f7605963ca9bb82f542d4e2ccc323266c08c9990cecdebd574e1ab304ae08ea8c6c94c50683180f83562f972e92799ebbcfcd8f503fb5a
-
Filesize
63KB
MD5710d7637cc7e21b62fd3efe6aba1fd27
SHA18645d6b137064c7b38e10c736724e17787db6cf3
SHA256c0997474b99524325dfedb5c020436e7ea9f9c9a1a759ed6daf7bdd4890bdc2b
SHA51219aa77bed3c441228789cf8f931ca6194cc8d4bc7bb85d892faf5eaeda67d22c8c3b066f8ceda8169177da95a1fe111bd3436ceeaf4c784bd2bf96617f4d0c44
-
Filesize
128KB
MD58d736f331838c1a953c61349419636f9
SHA15cdff2fa47ac42eefe559fcb99726488333b718c
SHA25608d35fede444c8bcb9ad213c7096c6c83712b6e7dcc76191436fbd0c64fbdadb
SHA512456288a82d37ba7bb5accf2a779bba9125651ed201c5bb435a1d0ff0660d5ed796be6dfa03b0c8459a5c38a4de1667080e2f95229533006233b9567209a4de0f
-
Filesize
89KB
MD520b4214373f69aa87de9275e453f6b2d
SHA105d5a9980b96319015843eee1bd58c5e6673e0c2
SHA256aa3989bee002801f726b171dcc39c806371112d0cfd4b4d1d4ae91495a419820
SHA512c1e86e909473386b890d25d934de803f313a8d8572eb54984b97f3f9b2b88cbe2fb43a20f9c3361b53b040b3b61afb154b3ec99a60e35df8cf3563dabf335f54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize672B
MD519268632d40341336d4f9e16e15ca170
SHA1685a92cdf45b83a76fd02f65530f3971c0cce41b
SHA256ffbfcbf976cce75776b69387329d07afb052603fd03a7abfbd497115bb2d3942
SHA5125f8f16b4e11b2eb6a8ac95883d9b64d8ccad2a9699f91faaf10eb148c41608718dcc3c83c3fc96a899d0ce623e686f228c3e3a79fb860f00027e2e4add402174
-
Filesize
457B
MD5b6ea2bf4136644fc9843df2922eebcad
SHA1adcb2ecd52a98d86a157c0c42f306b29e533a02b
SHA256ed93567fd626dd5d8bae62623a0117e065c262ad9ecaf722593872bf0cafb744
SHA5124f5f0d55927f6af69592c1ba2470d216fbe1813f533f337949a1f79663cd092e21cb3377d7704e69dea3bc95f4c6d8ad970364fd694e0e434fb720a21a79d039
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5dda21f640d1c5ae8b948d159b673caf8
SHA134f34dad78ba98ea21023b0a2032756c4767a09e
SHA256a603609e0180ddf0d7222506e152d1c0dec8daa308d2c470754feacd37824af2
SHA5126d881846784d216c552c6096c5e8ec218f34558e61566240ecb5f6f1fbc60fe50dc3813d8f08613df4d5f21def0ff432a14166d11ffba394ff9a5c1a3f4b058c
-
Filesize
5KB
MD53ddb30bd17f7e6b50e6b83f6a7fb3b7a
SHA15867bde9fde4b40b0d9fe5ddbebe4bcfa539eb49
SHA256a90499c71ef8a6762acfe8bb76c00ea74576925f3a5e9b37289123c2e263f20a
SHA512d5f80fdc869eee42f2b5f222cc99773374bfe05b3740b83d4dff09a94690ec569cea974c7b770d2fb1b4c8eee008daca93e2ab49497039b720930ca9ef60fd6e
-
Filesize
6KB
MD5c63fe3d281134657ee4cfd395b995247
SHA1bbc2a36f8773dafb083a7b194260160a93d8bf74
SHA2569ed42f53fb2263269f288d3a05eb917c71c6de82bb477d0f7f2e51b54c1ca435
SHA5124ce84e3cf41044b41bfa53a7c3c2c0f0183981df0d9cc5ecaa18d2047652ab2009e4d253c7636ec5512b62bcbb4918ee4e9308cffdc3dd1bce0594e4361d27a2
-
Filesize
24KB
MD55a478f1e08816969e8214f982850b754
SHA11cf5e7192f3c6e31c7e27b6cb34ebf89036eec0c
SHA256665cf5612c61412c9acc928b1e155c8f11ae83905ce614d9a1a7ad72cc0fd489
SHA5127e7ff60c157841f6f5bb206ebbce29f6df3a6c0c671805415ad7226654e13da49ad76e39a6d0afe28992348f3b5685ecacbfb44178fd61998c54caebbfd97832
-
Filesize
538B
MD5b525ee7a76db578a0eca128c45f3399a
SHA1e519279c726a868c659f8c9ce464a76afebb56db
SHA2565ae2719d7f1dc5066bf7a771a0f2bebd9f2bf452b1b7a51270d1fb32e69e2ed8
SHA512e685a46027c1930c06a5126c4304358473f53c4751df4a202f343ee97bde62fd89cfe2e00386e435c65d76d1c0c788effe8d23b4384279f89359f754e3ccd6a3
-
Filesize
538B
MD5ad76102cdb96ea7d8aba6083ae3b144a
SHA1902bbe38b6b77417e1aae3e00592a346553b4b08
SHA2562cfb37b0c2f13c35c26768e0c522d8a84f4faf0a93ec84fca0547a5b4e3d7bc4
SHA5122a9441091e61a5d4619e41680972018697644dff2cf4332894bc11d2c63adc5665e8e39f86526e4f22063caca941374faf9b6f901ca422169339a4cbdaa6e999
-
Filesize
12KB
MD5ea8ca63e332ff8566db5fa948fdec2ec
SHA16a41bac88ea8a130539f9706487e9f13fbbfeaad
SHA2562db7f90264ae2d8f8d48765ec3dad288d60819e29d1b3ac87b31733f8831b6a1
SHA512b13bac3ad167df2a20de546688749f0f08a284d41256abb2a4de12b6db2f383e9d4fcda391ca2c7b41d6cda44c749e2effd520b45748b53aff5dd317d85d3398
-
Filesize
12KB
MD5a7e9342219beec0f85d760f13917e166
SHA1712b569e158e0fc23f88ac40ab05d41f2eb980d4
SHA2563fe1e750cdc741f5d74ea5a6f52234de717c01ba05591a2094d2a4077b02e6e9
SHA512030f14ed95d82d34e1fa1d6e609cf0e8eba049f37cbf33cfad7c503c527b959bb7cefc341f75b0a937227ce2e84ee1013407e27cf1ec0368dd90e430e55351a1