Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
67s -
max time network
72s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2023, 17:13
Behavioral task
behavioral1
Sample
US_DOA_Tender_2023.pdf
Resource
win10v2004-20230703-en
General
-
Target
US_DOA_Tender_2023.pdf
-
Size
1.4MB
-
MD5
48013e1c61d468c98b5e0b20f75cb3be
-
SHA1
bcec8fe620aee8200086dc817d25dbac6744ad16
-
SHA256
6dc2ddd6f87fd0e118908028a5168f9139bb0dc9e5e7f6af25d32317c22a25ee
-
SHA512
667761785e541e4e5b8818827ed5dcb7cafa444a6285c3a642249182fb03791036561ee9e95b44271374664e23f7f06395ee6b101a874841dbbdcb53500c300b
-
SSDEEP
24576:0ZWdNUD1km/sB5cVqXhPZUFlNMQk3gmn2nJLyATdtES0cP7H:0wYD1klMVWsXNZk7ATdtE1cP7H
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1484 AcroRd32.exe 1484 AcroRd32.exe 1484 AcroRd32.exe 1484 AcroRd32.exe 1484 AcroRd32.exe 1484 AcroRd32.exe 1484 AcroRd32.exe 1484 AcroRd32.exe 1484 AcroRd32.exe 1484 AcroRd32.exe 1484 AcroRd32.exe 1484 AcroRd32.exe 1484 AcroRd32.exe 1484 AcroRd32.exe 1484 AcroRd32.exe 1484 AcroRd32.exe 1484 AcroRd32.exe 1484 AcroRd32.exe 1484 AcroRd32.exe 1484 AcroRd32.exe 2236 msedge.exe 2236 msedge.exe 800 msedge.exe 800 msedge.exe 4884 identity_helper.exe 4884 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1484 AcroRd32.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1484 AcroRd32.exe 1484 AcroRd32.exe 1484 AcroRd32.exe 1484 AcroRd32.exe 1484 AcroRd32.exe 1484 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1484 wrote to memory of 644 1484 AcroRd32.exe 87 PID 1484 wrote to memory of 644 1484 AcroRd32.exe 87 PID 1484 wrote to memory of 644 1484 AcroRd32.exe 87 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 564 644 RdrCEF.exe 88 PID 644 wrote to memory of 1584 644 RdrCEF.exe 89 PID 644 wrote to memory of 1584 644 RdrCEF.exe 89 PID 644 wrote to memory of 1584 644 RdrCEF.exe 89 PID 644 wrote to memory of 1584 644 RdrCEF.exe 89 PID 644 wrote to memory of 1584 644 RdrCEF.exe 89 PID 644 wrote to memory of 1584 644 RdrCEF.exe 89 PID 644 wrote to memory of 1584 644 RdrCEF.exe 89 PID 644 wrote to memory of 1584 644 RdrCEF.exe 89 PID 644 wrote to memory of 1584 644 RdrCEF.exe 89 PID 644 wrote to memory of 1584 644 RdrCEF.exe 89 PID 644 wrote to memory of 1584 644 RdrCEF.exe 89 PID 644 wrote to memory of 1584 644 RdrCEF.exe 89 PID 644 wrote to memory of 1584 644 RdrCEF.exe 89 PID 644 wrote to memory of 1584 644 RdrCEF.exe 89 PID 644 wrote to memory of 1584 644 RdrCEF.exe 89 PID 644 wrote to memory of 1584 644 RdrCEF.exe 89 PID 644 wrote to memory of 1584 644 RdrCEF.exe 89 PID 644 wrote to memory of 1584 644 RdrCEF.exe 89 PID 644 wrote to memory of 1584 644 RdrCEF.exe 89 PID 644 wrote to memory of 1584 644 RdrCEF.exe 89
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\US_DOA_Tender_2023.pdf"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=01725543290B8D09ACB20BF39644EEC4 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:564
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=1F3E24ABEF605C1254ACFC8F61E42A87 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=1F3E24ABEF605C1254ACFC8F61E42A87 --renderer-client-id=2 --mojo-platform-channel-handle=1764 --allow-no-sandbox-job /prefetch:13⤵PID:1584
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8FADFAC9E864C5B510232E27AB67DA1F --mojo-platform-channel-handle=2176 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4216
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=EC543FC5191DED30D2ECE5AFC55A219F --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=EC543FC5191DED30D2ECE5AFC55A219F --renderer-client-id=5 --mojo-platform-channel-handle=1736 --allow-no-sandbox-job /prefetch:13⤵PID:5052
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C9A66754215CD29A49EDC989AC17AA5D --mojo-platform-channel-handle=2424 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4360
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A44EF9042294A96F0FE774417F6505C4 --mojo-platform-channel-handle=2272 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1440
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://doa-gov.com/2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffacec946f8,0x7ffacec94708,0x7ffacec947183⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,14158487052419307163,3414544701082736325,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,14158487052419307163,3414544701082736325,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:23⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,14158487052419307163,3414544701082736325,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:83⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14158487052419307163,3414544701082736325,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:13⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14158487052419307163,3414544701082736325,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:13⤵PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14158487052419307163,3414544701082736325,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:13⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,14158487052419307163,3414544701082736325,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:83⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,14158487052419307163,3414544701082736325,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14158487052419307163,3414544701082736325,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:13⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14158487052419307163,3414544701082736325,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:13⤵PID:2484
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
64KB
MD5adc78e8a349627dbdb33d3558440d3b7
SHA1733faac9167540595f34a54728efb28dce7a9cf9
SHA2563d7175eeba1ee05b7deae39610ab774d207f02a3ad3e2cb123f87ed8154ddc07
SHA51271a999d7ee8750f350031f1671e32ed433e5bfe0778ae5c229b991b75ad7881730432c5613a35c631c5d370308277ba72b789d9757b6a000cbebfe587e7befbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize471B
MD55838acf201c04717081c8dcbdd7f022c
SHA16bc2c1f4f76e9add2a5ce6070a636672a69ca1e0
SHA256eedc1d83cbf5bb093a4ae30dc171784c1a53831f324324c0f986a96ee6e9d646
SHA512b17fe19bebe5cb18d3f8280aad4f9c8bbaa8dd89ad8dc398e620239d19b3a55006ca7b9f1fb209db4090f0108c9e314e4b9e50c23d4d0105b1595aecc8ddc3cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize400B
MD54856e099393c03fda0c34089972a621e
SHA1d7f2a9c081f5d80de3ac270296a7a6f92ca88841
SHA25671fb3e1c51b220511c37ae658e8e59c752bc123d445bba6ade409b3f5e509830
SHA51281fd24bf26ab70315dc0b960e762de21770d0a5d30d28d7c4a5d3cd99040689b7f6ec4c6bf3330462554e4b5d55c93d8299c74037a5f7ec2b058c0ada31e6c76
-
Filesize
152B
MD5a7ad9bb1054aa03e39b3554833d0c3ec
SHA1cbd5b99ca100bc2f1292df23bf8e2a5a6f9640d9
SHA2560c3eae39386b4117ad26187afc4933e254468cd12d813271f4b7420cee73c189
SHA512d1d0b77e0bc412b4ee687e849531a7c9b70200d45d0bdbf38357b6fc59af835522e749b2fd8c2d4cde73518970568c38d73416c97381a11cc6029c14b1678276
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5e573d0a0739e6c17286f6953aa312d2e
SHA11f7aed2c968c223aeacb7084e13d2e14651e24bf
SHA25606d00db9615ec0d72e41a144457d2e1bebe31ca4fbe6e002812ac46438e0c6dd
SHA5125c5e518c205fb26f9001fbb1fb5561627b020f87d74cc0bde4f2ef5d6b3b6ed82b2f4a5f4cb0819b9c81074ca6c5dc13ae50a2d67e577b5c3f05fcfd32180160
-
Filesize
6KB
MD5c87ba729f667e1e3379b9b625226b064
SHA1d429ebef6803d8074e33a2f53735356b201a45f1
SHA256bb6952913ff6ec45730cba63032f35f453af91fca327fba219b2035ff28b2970
SHA51211a27e9c8c54d7e37da270a3c1708e9f2747129f82cd6fcb9256172e98aac273781545e8795308db22fa6857a8dfaecfb002d28cb4998d027d49c39d367bdf6d
-
Filesize
24KB
MD5e62cc4051e1f8eaa0abda5d730a2496b
SHA1d15346e40b196bc313cbfe5ac96b3c90b83345be
SHA256ffb5b740b8777d010f0d32a120092084c3cd32eaceb937188d698ddc22df2fcb
SHA5123e8f6d89c7c153177b2149d86cd8602ceafedf66f5335a86b19dfa46fc38c47f6ff9a272c3b71b4464a5921ebdf2461fba25692ca916b9715bac520bf1e81a22
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD585ac0ddaf21810cefb3df117639cc724
SHA12072d211587e0b61eda92629c489ec8d178b907d
SHA2560d502ce084c3c4454f490f9cac7c676ca42b5b46bdf20607f1ef8c6b6fd2a23b
SHA512cf23748d9fc8836822b242fcea91108442fd7add20b0a2ba181b5c603430f722568d0ba3e693feac07a4fd16ab57dafd65c34e3f4944eb55bd46e2074a6e4c1b