Analysis
-
max time kernel
90s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16/08/2023, 19:38
Behavioral task
behavioral1
Sample
Catálogo Contalequipos 2023.pdf
Resource
win10v2004-20230703-en
General
-
Target
Catálogo Contalequipos 2023.pdf
-
Size
469KB
-
MD5
53fc1c2b95a9f80e663fb11d1b3b68fd
-
SHA1
c1485d1075d8dfaaeeaf068a75dded2ebf48525e
-
SHA256
36a8a5d9cfea4e5a6945f07afec35e3110c94dec321a9a5264f097ce7ee971cd
-
SHA512
98806c5406cc0ba8b10e4a4c984e50c3c25488e559917367c03131c81f861d4f012684204a1bb80b0542827511f4f366f6e5a0a458baab73215ebdde49cb66d0
-
SSDEEP
12288:sN85caKwoxLErJPKqjMWUWKE6axKLNBNAT2WEbrew:Ri3wOorJPkWh6ampu2tbh
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1060 AcroRd32.exe 1060 AcroRd32.exe 1060 AcroRd32.exe 1060 AcroRd32.exe 1060 AcroRd32.exe 1060 AcroRd32.exe 1060 AcroRd32.exe 1060 AcroRd32.exe 1060 AcroRd32.exe 1060 AcroRd32.exe 1060 AcroRd32.exe 1060 AcroRd32.exe 1060 AcroRd32.exe 1060 AcroRd32.exe 1060 AcroRd32.exe 1060 AcroRd32.exe 1060 AcroRd32.exe 1060 AcroRd32.exe 1060 AcroRd32.exe 1060 AcroRd32.exe 4268 msedge.exe 4268 msedge.exe 1852 msedge.exe 1852 msedge.exe 1188 identity_helper.exe 1188 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1060 AcroRd32.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1060 AcroRd32.exe 1060 AcroRd32.exe 1060 AcroRd32.exe 1060 AcroRd32.exe 1060 AcroRd32.exe 1060 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1060 wrote to memory of 2192 1060 AcroRd32.exe 84 PID 1060 wrote to memory of 2192 1060 AcroRd32.exe 84 PID 1060 wrote to memory of 2192 1060 AcroRd32.exe 84 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 1748 2192 RdrCEF.exe 85 PID 2192 wrote to memory of 4668 2192 RdrCEF.exe 86 PID 2192 wrote to memory of 4668 2192 RdrCEF.exe 86 PID 2192 wrote to memory of 4668 2192 RdrCEF.exe 86 PID 2192 wrote to memory of 4668 2192 RdrCEF.exe 86 PID 2192 wrote to memory of 4668 2192 RdrCEF.exe 86 PID 2192 wrote to memory of 4668 2192 RdrCEF.exe 86 PID 2192 wrote to memory of 4668 2192 RdrCEF.exe 86 PID 2192 wrote to memory of 4668 2192 RdrCEF.exe 86 PID 2192 wrote to memory of 4668 2192 RdrCEF.exe 86 PID 2192 wrote to memory of 4668 2192 RdrCEF.exe 86 PID 2192 wrote to memory of 4668 2192 RdrCEF.exe 86 PID 2192 wrote to memory of 4668 2192 RdrCEF.exe 86 PID 2192 wrote to memory of 4668 2192 RdrCEF.exe 86 PID 2192 wrote to memory of 4668 2192 RdrCEF.exe 86 PID 2192 wrote to memory of 4668 2192 RdrCEF.exe 86 PID 2192 wrote to memory of 4668 2192 RdrCEF.exe 86 PID 2192 wrote to memory of 4668 2192 RdrCEF.exe 86 PID 2192 wrote to memory of 4668 2192 RdrCEF.exe 86
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Catálogo Contalequipos 2023.pdf"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=8BAC3234832E8D2BBB9ECC1C67F98798 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=8BAC3234832E8D2BBB9ECC1C67F98798 --renderer-client-id=2 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job /prefetch:13⤵PID:1748
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=097934170C4E279472A88A9AE68A6576 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4668
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=809E7090C683E4DDA01EBEB04C3891F0 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=809E7090C683E4DDA01EBEB04C3891F0 --renderer-client-id=4 --mojo-platform-channel-handle=2296 --allow-no-sandbox-job /prefetch:13⤵PID:4372
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=75D5029412A8CB9065FF207202C9F6B9 --mojo-platform-channel-handle=2556 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:5112
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=5BC8C14AB7FEB4B0DBA0D061454F6F1A --mojo-platform-channel-handle=2548 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3624
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B272679977251AAF9A64D693C8D587FA --mojo-platform-channel-handle=2892 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4804
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.contalequipos.com/2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4268 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe5d2946f8,0x7ffe5d294708,0x7ffe5d2947183⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,12126193146725521296,16165772270821562538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,12126193146725521296,16165772270821562538,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:23⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,12126193146725521296,16165772270821562538,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:83⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12126193146725521296,16165772270821562538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:13⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12126193146725521296,16165772270821562538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:13⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12126193146725521296,16165772270821562538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:13⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2160,12126193146725521296,16165772270821562538,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4164 /prefetch:83⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12126193146725521296,16165772270821562538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4256 /prefetch:13⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12126193146725521296,16165772270821562538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:13⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,12126193146725521296,16165772270821562538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6008 /prefetch:83⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,12126193146725521296,16165772270821562538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6008 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12126193146725521296,16165772270821562538,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:13⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12126193146725521296,16165772270821562538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:13⤵PID:3412
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5080
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2d4 0x4c01⤵PID:2120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
64KB
MD5f95b3a864b612d0326af3ad7e1272ac4
SHA1d657843e40088204cb977c16063ddbe058a34a0f
SHA256acc6bf1de15747f10f39ef2a980b35441a5a1debf9b5ef98a6e124a4f6a7c191
SHA512bdfb54eff9fc1cb636210e38716f87bd76d247ed17a78320e0c6cc8d58517b719d8307f6b90d760ba5e7beccd4b2ce3c8361e5e128f01f84bf5fc63b4e636fd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize471B
MD5afec6ff88f5f5170609d2b74cf9a5b48
SHA146d59614c4b91babe155a48c21f0ef766b51c854
SHA2567f8f46d77c84d2953512846a84730c298ad3aa1b6ae79af98470f929f2ac5ea5
SHA51221c4faac8e470b2b5b2ca976bda38a412c589c95bac3344c13ec18d4dfb8be26a9b0a442ebd20239f95e1b531cafc578522ceafe124702b4e386faed388cfc0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize400B
MD5dcdfcdde03b0646e10dc4e1fe0b01507
SHA17db962b9aed0d9147f6b2e324c47a7548706614f
SHA2562345fb83fe046662ba1ef23bec4a6ce883b6356790550cc8f45cf2b0a684f474
SHA512f2945d2eda669f24bcb18408272ee82b336fff921aaebe61945410efe7df4c8e19ee67d8618cf26ff42bd2275f3320497c39f3bf2c3f0a87d613a5c6fc8592c9
-
Filesize
152B
MD5b950ebe404eda736e529f1b0a975e8db
SHA14d2c020f1aa70e2bcb666a2dd144d1f3588430b8
SHA256bcc60276d7110e8d002f24d66ebb043c5761e2a4b6ae7854983cef4beacd9bf4
SHA5126ba228e5b6464c9602db81de8e1189302d0b2aed78a8b06248ccd9f095ede8621fc9d0faed0a7d079b8c7f4d1164b2895c4d0ef99c93cb95bbe210033e40295a
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5a4cfef69f17513635d1887f5b97ce26a
SHA13d02a7ec7a6f8cd2198db4e3814f7d7b71a55215
SHA2567611bc0a617e84ab31f60f482654b0c3367aedd54fd4645ae0b3b211ec0d85d9
SHA5129e34ba8da4f2e44b3984c475071fd99a1e83c69000f2851b14ffc1a3e012a4ee8f50397d615d06273a951624ad862335ba78b56b420baae887f07bcdc940d235
-
Filesize
5KB
MD56e6097f573a7e08cf82a1d9a4d4cec46
SHA1a6f1abccde12d62f3c15f3562fb96c16823453f6
SHA2566c278afcd0f87e6357b296d3ea16db8e08619d56d2e465d993dd398b85681ba7
SHA512fe6fd5274de15103ffe1afc0e5dfb5aece6cef06839c45b2ecf03b84bc707f7dc172857deb2f876ffe76e1cbf581a5a0e85097e99a87e6595905f30498324bb8
-
Filesize
5KB
MD54b7355e09495d2ae5c44796a8900170c
SHA1f0c8d7b8ed44d5f42ed1b8e4070c5e649a4f738c
SHA256a6b470e887f5b11c7088a8edac3e575170a6505f41f991d53dd9446fc8186d86
SHA512b689105fcdaef9893a6277a9c49df87808f6995aa19e7ff2d68cf629e4b2a5911efdd7da58192ecf5deab26e52a78a5a7a3c94bebefa05d12e15270667da3170
-
Filesize
24KB
MD5ca36933e6dea7aa507a272121b34fdbb
SHA13b4741ca0308b345de5ecf6c3565b1dbacb0fb86
SHA256fd14449eb781c58e6e7196a384caf25cba0c59ebdba3b10f8ca0ecfd0c076b5d
SHA5125a9b186ecf085765caee97a2910008dda926ce412001042e165184083a52fb5fb70f05ca781cd2f7740ecbd938895c77c5aa0f9eb8d812b92f412f336212720e
-
Filesize
1KB
MD5836b418aca20db25118a02a03e8c5682
SHA19e1621a5842bfe3d0044c0647d744d11e9539986
SHA256a033cd5fe81c1cf581ae7d0e9add870c9116ae57c13d2439afca0b985953ea73
SHA51285b061905180804b415568bc239f69002904d069186194b66e5230e0a5ecadd6a35bd5ba1301a6c327f3fc919799cb887dcdfe5df8900f2ef22333beb075884f
-
Filesize
1KB
MD5acef51b229f13a5ae794e5d0cfadcd68
SHA1c1525d9bc17044bdc96c6995dad4e1006fe8f31e
SHA256329b6403e98d9b9a1cc7c42afb5af0e4d964ae5bd2c28d65d014e86e18d02167
SHA51209272144263f0c851e2d46242061f69ba009d526cc2c03aba89a5ce635c505d9afda30e4a8a1e54c28f6b7e838e357cd53a58878612ea3695240b0b5d7070112
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5daaa7d1e51459e21f9d55e09133d7ec8
SHA111f088d76efca40239f4b014d8a51cd3391b3f47
SHA256060785780f89dbf9b52a1e6ef3bb485dc1157c61ba3c38c565e073aef6d1a9d6
SHA5120e78ef83a58d2c2d542e71e5d5727f33881b613007765cc4615e74dbee1703df0a9acbcfcdb69591905bbd5e37d3d685970c86ec775e56d3a388fb31f9b8f633