Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2023, 00:09
Behavioral task
behavioral1
Sample
Label-495614810.pdf
Resource
win10v2004-20230703-en
General
-
Target
Label-495614810.pdf
-
Size
49KB
-
MD5
db44eaa51ef5b7dc4c67fd1fb8acacc7
-
SHA1
4622675c96063b1398bb377aaee796f55f3b714a
-
SHA256
c332f6af79e59af584f07bca25de782f6d1fe4db2216ec9d4f84ace8c417dc05
-
SHA512
31e3f286822a226aa17c8d86a149d7e043b0291c42f086120c71e8b05326571548cab057bb7bc98832a19a7dbead8f45f1c2e5fb322a56db9d836a200084e7d9
-
SSDEEP
768:p+YatFVd/n0WY74IuOyZSvnc7jYqUv5GuSZ5Yow5nKVFz78uFtzw/abRjFM:pitFbn0374I4kvcJUhlSFKKnP5xRjFM
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2960 AcroRd32.exe 2960 AcroRd32.exe 2960 AcroRd32.exe 2960 AcroRd32.exe 2960 AcroRd32.exe 2960 AcroRd32.exe 2960 AcroRd32.exe 2960 AcroRd32.exe 2960 AcroRd32.exe 2960 AcroRd32.exe 2960 AcroRd32.exe 2960 AcroRd32.exe 2960 AcroRd32.exe 2960 AcroRd32.exe 2960 AcroRd32.exe 2960 AcroRd32.exe 2960 AcroRd32.exe 2960 AcroRd32.exe 2960 AcroRd32.exe 2960 AcroRd32.exe 112 msedge.exe 112 msedge.exe 872 msedge.exe 872 msedge.exe 32 identity_helper.exe 32 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2960 AcroRd32.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2960 AcroRd32.exe 2960 AcroRd32.exe 2960 AcroRd32.exe 2960 AcroRd32.exe 2960 AcroRd32.exe 2960 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2960 wrote to memory of 3924 2960 AcroRd32.exe 90 PID 2960 wrote to memory of 3924 2960 AcroRd32.exe 90 PID 2960 wrote to memory of 3924 2960 AcroRd32.exe 90 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 232 3924 RdrCEF.exe 92 PID 3924 wrote to memory of 3344 3924 RdrCEF.exe 93 PID 3924 wrote to memory of 3344 3924 RdrCEF.exe 93 PID 3924 wrote to memory of 3344 3924 RdrCEF.exe 93 PID 3924 wrote to memory of 3344 3924 RdrCEF.exe 93 PID 3924 wrote to memory of 3344 3924 RdrCEF.exe 93 PID 3924 wrote to memory of 3344 3924 RdrCEF.exe 93 PID 3924 wrote to memory of 3344 3924 RdrCEF.exe 93 PID 3924 wrote to memory of 3344 3924 RdrCEF.exe 93 PID 3924 wrote to memory of 3344 3924 RdrCEF.exe 93 PID 3924 wrote to memory of 3344 3924 RdrCEF.exe 93 PID 3924 wrote to memory of 3344 3924 RdrCEF.exe 93 PID 3924 wrote to memory of 3344 3924 RdrCEF.exe 93 PID 3924 wrote to memory of 3344 3924 RdrCEF.exe 93 PID 3924 wrote to memory of 3344 3924 RdrCEF.exe 93 PID 3924 wrote to memory of 3344 3924 RdrCEF.exe 93 PID 3924 wrote to memory of 3344 3924 RdrCEF.exe 93 PID 3924 wrote to memory of 3344 3924 RdrCEF.exe 93 PID 3924 wrote to memory of 3344 3924 RdrCEF.exe 93 PID 3924 wrote to memory of 3344 3924 RdrCEF.exe 93 PID 3924 wrote to memory of 3344 3924 RdrCEF.exe 93
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Label-495614810.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D0DE8DB4185B94CA2E277CECC160BB55 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:232
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=2ACD63B24EC242AC5416D70A36632D13 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=2ACD63B24EC242AC5416D70A36632D13 --renderer-client-id=2 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job /prefetch:13⤵PID:3344
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=7DD8F5E318C0D9E8F72D8DC99B1C60CB --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=7DD8F5E318C0D9E8F72D8DC99B1C60CB --renderer-client-id=4 --mojo-platform-channel-handle=2312 --allow-no-sandbox-job /prefetch:13⤵PID:2128
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=60C7950806B34479E1B79830A299AEC7 --mojo-platform-channel-handle=1820 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1224
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=4386A386E0880A610C0FC6195A0518D3 --mojo-platform-channel-handle=2676 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1088
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=CAA5C1CBCAE5CACEC26E88F0985F2179 --mojo-platform-channel-handle=2664 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:380
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://inpost.co.uk/lockers/?utm_source=zigzag&utm_medium=email&utm_campaign=thank_you2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa3fe746f8,0x7ffa3fe74708,0x7ffa3fe747183⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,17907471785438401073,8767005237849867824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,17907471785438401073,8767005237849867824,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:23⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,17907471785438401073,8767005237849867824,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:83⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17907471785438401073,8767005237849867824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:13⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17907471785438401073,8767005237849867824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:13⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17907471785438401073,8767005237849867824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:13⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17907471785438401073,8767005237849867824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:13⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,17907471785438401073,8767005237849867824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:83⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,17907471785438401073,8767005237849867824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17907471785438401073,8767005237849867824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:13⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17907471785438401073,8767005237849867824,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:13⤵PID:5364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17907471785438401073,8767005237849867824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:13⤵PID:5356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17907471785438401073,8767005237849867824,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6212 /prefetch:13⤵PID:5544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17907471785438401073,8767005237849867824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:13⤵PID:5536
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
64KB
MD5487bc77130444f2400c273ccb3a9d7dd
SHA14dcf3a01229bf2074fa03d0f28ce16d620cead58
SHA25600e8bbc1303d79c2d79fe5af4888a238a69c11f72c2e9ffbac76cf7388af2182
SHA512c135fe2dab72b6150af0df88578fbdc3d88d35a01bbdc9a688b1fdf0ac24e8b46259ec199931ec2d54dce2a348e417a4d932365caa901818e0e6b4f0d0d58b03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize471B
MD545c70360d52a750f87c2260f65a1893d
SHA1867ade23401bc7befbe383590d314cd945002e33
SHA256844973114a2259557d6c3b2c984a79cbe51a69243dfd02a912b88265ab3d7539
SHA5129e687b044deaacaaffbe625217dc611045ab1637d2071c2052128d1aa52b767545f300e48aa2df6c6782e846262be363f46379241c25dda0cada9ba4b0dc9de6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize400B
MD5541486e6364cc7e6bac7bf7f7fc523c7
SHA13065f94b1f2188f67c32d5e47391d7159f579421
SHA256baa767fd38ca5dd19e3c574be96cf454233d978592b5243027651546e4b2a472
SHA5126957643c3ec434cecf9001ba476bf027c9778887a1f5f326eb98f1c0a65e6c85806bc60584f4776157d61da8b3dd2354b4ce725436be6947fe63e8f5566494f2
-
Filesize
12KB
MD5492d14d4523c071d48c17697a65723b7
SHA171453d13b790e6c3d31fc43c77c7d9457b535c9c
SHA2566f3838bda1be96ad6afbda3e90038ca3863ebec297b46183e264f6e3936d551f
SHA51210fa30e9b7c30be1742e91a2fccdb4e03e1dc52169899b475b78bf832e7bc604089f3709f499d3f3681059edaee26ee6f8cf80f30e925920bce3542ea7a6fd53
-
Filesize
152B
MD5b950ebe404eda736e529f1b0a975e8db
SHA14d2c020f1aa70e2bcb666a2dd144d1f3588430b8
SHA256bcc60276d7110e8d002f24d66ebb043c5761e2a4b6ae7854983cef4beacd9bf4
SHA5126ba228e5b6464c9602db81de8e1189302d0b2aed78a8b06248ccd9f095ede8621fc9d0faed0a7d079b8c7f4d1164b2895c4d0ef99c93cb95bbe210033e40295a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize840B
MD590bee012e1e40a3daecd0e5fb38fa2c5
SHA1c211b2a8b8df54d6d2591cabccf473f93555a378
SHA256f01ad8059d2f542bcfcbb4f5f074ed07e1303454883117c92ba988a9c00912b7
SHA5128f945fc78d39e9de118733b9e08fac2c90429c20c8b0b1f548d4d2b7b4181b7316a56a36c08ee7b5a7339d6b045b5fcc8e09c5a6769561992e0b3413313d4e63
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize552B
MD5343a2c567f013eb18b5a6d61fe3cdd54
SHA1b2cde0c8ad1dd432d91cfa53bfb0c3f82919ece5
SHA256a2ddb2a77ca19b25d52c41e2f8ffa574be65315069516b8671cc47714e6243b9
SHA5124fac7f0e6e3451028829ba0dac66b4d5fd453a6adc52a56cd35dbfca51592fac41f0f7aeea7ef60242e33657c7ed5010e25dfd87338127a13298550f62213726
-
Filesize
3KB
MD5e6f262e8cbbf14fb9205efbeafc9e1b6
SHA177dee8cff0b2c1a671a37f7394ce5f7e08a9636b
SHA256f44122293463b1a07446577efb591bad3ee439dcc8b06070aae82d79a8eb318f
SHA5125ddde3600518c97d9ef684c1ef00d544efef06b99bca5bf63279a3eb638cecc361ebb0f08892c4af886f20d4af0211cd30e8d0659ad45ebe286624e2e32ecdae
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
8KB
MD56e53c6d59f6da87ba791ce0e752d2af3
SHA15d58c4286ca8f887b577f9161bf238f011aeb702
SHA25660c0d204499f22d08ffbffc989ba97c08da8458b9257e04b1a7161cf0f23c2b6
SHA512a5c7814ef224f6fe236f9d4c61c12fe190eefac4b500350419d3bf137dafbe48553f1ad763c0ffd8cf27615ded975b0a7b91063f887c2e33fa788bcc4da8ef3c
-
Filesize
5KB
MD5f7311d31ad0c7106fc256a9bb7a28c49
SHA12f55a48ef71983a9b1cb6f7c67f4592cfa439ac5
SHA256ef76da4c69f8a968924995ea7062533e6e09b806d9a78051008d9c17cd7f0e8b
SHA5122cf07c2c31a3aa5c242053e6f235323be3d8618ec1bc7c577b472bcf4e19faa91edc6f78c6e4d29fa0a12d3b71a326dcb6410594c6c7f22135d776fd0150b3e8
-
Filesize
7KB
MD529f8fdfb0b4529fd53b2d70793b6d11b
SHA1811dbef87f93585367c831372cec44910f0fc4d2
SHA2562f63f29137d24c672233eb53cb54b77c8d6911082b526ee26aefb953a28766a5
SHA5124ec4e5f7fc18f5fc8850cdd3452d400c514b2b2eee16380ed60b395b256f7256abc899538c658fd0bc563806e2cb87930457747d0134722b70af18fbfdad0261
-
Filesize
24KB
MD5ca36933e6dea7aa507a272121b34fdbb
SHA13b4741ca0308b345de5ecf6c3565b1dbacb0fb86
SHA256fd14449eb781c58e6e7196a384caf25cba0c59ebdba3b10f8ca0ecfd0c076b5d
SHA5125a9b186ecf085765caee97a2910008dda926ce412001042e165184083a52fb5fb70f05ca781cd2f7740ecbd938895c77c5aa0f9eb8d812b92f412f336212720e
-
Filesize
1KB
MD5987700553404e2268cc16e8ec8cd3f24
SHA16e92eb189d21271eb0f2354815e529108066e695
SHA256dfe4e313a82771876eadbf600e94391043cbd761c477a6d033eb8a20e4cb69dc
SHA512095c6882cce9e2162ac70943c8f156779b8406c1bf078942ad2162c3a0b04bc836df84cd9185d678a62253a3b8c6b652f63aab893492ab57a31282c87c38c540
-
Filesize
539B
MD5ee99c8ba1a2a5f28872bdeff67bd8519
SHA1e420ae67547cbf483ef59bc1eab8598ee0c49c1c
SHA256dbe2752975340eec71acd3c5afc3eb7da1ec5baab3e1fe1c6f0677ec09fad9f2
SHA5124ef327e5de8ce05349585b326fc315ee275c9b7a1ac1d467718ec09b90aae2d59183b4b88737521749634d8df9a3edb4445431d398e9cbd87ff0e25714e7cfca
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389