Analysis
-
max time kernel
87s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2023, 07:48
Static task
static1
Behavioral task
behavioral1
Sample
Blox Fruits SKY HUB - NO KEY SYSTEM - REACH MAX LEVEL AND FARM RARE FRUITS (1).txt
Resource
win10v2004-20230703-en
General
-
Target
Blox Fruits SKY HUB - NO KEY SYSTEM - REACH MAX LEVEL AND FARM RARE FRUITS (1).txt
-
Size
95B
-
MD5
960803799211fdf9e47ed94f1a255b2e
-
SHA1
1fca720e7f5b59bb697dad19f66f7aa3887d9f02
-
SHA256
9c08cf3df3f95060440d8b7a5331b1e0fea17427394566ccf47ffdeaa303cdfe
-
SHA512
c9e69f6e72b24cd3761c2d96628670a670e6cec9eff6ff335b5fcaed0ba3ef642d1304736cacaf7536b0f980073cf9de9d06ed93dda6604dbb263f6917565a0a
Malware Config
Signatures
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3195054982-4292022746-1467505928-1000\{13A47540-DE26-433B-8198-E126B414AA08} msedge.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3500 multiBOX.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1120 msedge.exe 1120 msedge.exe 3648 msedge.exe 3648 msedge.exe 1312 identity_helper.exe 1312 identity_helper.exe 3424 msedge.exe 3424 msedge.exe 1124 msedge.exe 1124 msedge.exe 3500 multiBOX.exe 3500 multiBOX.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3500 multiBOX.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
pid Process 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: 35 3500 multiBOX.exe -
Suspicious use of FindShellTrayWindow 42 IoCs
pid Process 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3500 multiBOX.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3648 wrote to memory of 700 3648 msedge.exe 86 PID 3648 wrote to memory of 700 3648 msedge.exe 86 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 3016 3648 msedge.exe 89 PID 3648 wrote to memory of 1120 3648 msedge.exe 87 PID 3648 wrote to memory of 1120 3648 msedge.exe 87 PID 3648 wrote to memory of 4304 3648 msedge.exe 88 PID 3648 wrote to memory of 4304 3648 msedge.exe 88 PID 3648 wrote to memory of 4304 3648 msedge.exe 88 PID 3648 wrote to memory of 4304 3648 msedge.exe 88 PID 3648 wrote to memory of 4304 3648 msedge.exe 88 PID 3648 wrote to memory of 4304 3648 msedge.exe 88 PID 3648 wrote to memory of 4304 3648 msedge.exe 88 PID 3648 wrote to memory of 4304 3648 msedge.exe 88 PID 3648 wrote to memory of 4304 3648 msedge.exe 88 PID 3648 wrote to memory of 4304 3648 msedge.exe 88 PID 3648 wrote to memory of 4304 3648 msedge.exe 88 PID 3648 wrote to memory of 4304 3648 msedge.exe 88 PID 3648 wrote to memory of 4304 3648 msedge.exe 88 PID 3648 wrote to memory of 4304 3648 msedge.exe 88 PID 3648 wrote to memory of 4304 3648 msedge.exe 88 PID 3648 wrote to memory of 4304 3648 msedge.exe 88 PID 3648 wrote to memory of 4304 3648 msedge.exe 88 PID 3648 wrote to memory of 4304 3648 msedge.exe 88 PID 3648 wrote to memory of 4304 3648 msedge.exe 88 PID 3648 wrote to memory of 4304 3648 msedge.exe 88
Processes
-
C:\Windows\system32\NOTEPAD.EXEC:\Windows\system32\NOTEPAD.EXE "C:\Users\Admin\AppData\Local\Temp\Blox Fruits SKY HUB - NO KEY SYSTEM - REACH MAX LEVEL AND FARM RARE FRUITS (1).txt"1⤵PID:1288
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff98c7546f8,0x7ff98c754708,0x7ff98c7547182⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,11526263863679275873,2568463055922659508,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,11526263863679275873,2568463055922659508,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,11526263863679275873,2568463055922659508,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:22⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,11526263863679275873,2568463055922659508,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,11526263863679275873,2568463055922659508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,11526263863679275873,2568463055922659508,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4456 /prefetch:12⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,11526263863679275873,2568463055922659508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4548 /prefetch:12⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,11526263863679275873,2568463055922659508,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3396 /prefetch:82⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,11526263863679275873,2568463055922659508,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3396 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,11526263863679275873,2568463055922659508,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,11526263863679275873,2568463055922659508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,11526263863679275873,2568463055922659508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4592 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,11526263863679275873,2568463055922659508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,11526263863679275873,2568463055922659508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,11526263863679275873,2568463055922659508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2408 /prefetch:12⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,11526263863679275873,2568463055922659508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2212,11526263863679275873,2568463055922659508,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5732 /prefetch:82⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2212,11526263863679275873,2568463055922659508,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=6008 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,11526263863679275873,2568463055922659508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1840 /prefetch:12⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,11526263863679275873,2568463055922659508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,11526263863679275873,2568463055922659508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2212,11526263863679275873,2568463055922659508,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=1360 /prefetch:82⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,11526263863679275873,2568463055922659508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2240 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2212,11526263863679275873,2568463055922659508,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6292 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1124
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2420
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2348
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2752
-
C:\Users\Admin\Downloads\multiBOX\multiBOX\multiBOX.exe"C:\Users\Admin\Downloads\multiBOX\multiBOX\multiBOX.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3500
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53423d7e71b832850019e032730997f69
SHA1bbc91ba3960fb8f7f2d5a190e6585010675d9061
SHA25653770e40359b9738d8898520d7e4a57c28498edddbadf76ec4a599837aa0c649
SHA51203d5fee4152300d6c5e9f72c059955c944c7e6d207e433e9fdd693639e63ea699a01696d7bbf56d2033fd52ad260c9ae36a2c5c888112d81bf7e04a3f273e65d
-
Filesize
181KB
MD54c75aa07dd23352ee1225b5a64cc6b59
SHA1387c73c282f9b15d8f62b2c9d830945772c88c7a
SHA256edeab1e3b20750bb1c0d394b111109c0c7ab74d34117d16ee1487cc1cb8c23fc
SHA512a0e185b33114a19e6ace4b7f6af1983c45b124ecf4ce82f92ff832ad9a57ae895798ccd4473a46b9fd530831482b3ec3dc729b10c2c85095a54a6834c563d86f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD55b05e30495814b8e305218f99a68a5cd
SHA14f6f5160bfac7958cb558d983ccfa39d4d9a9ff1
SHA2565f2faeda41243996d3987a1476f580deefc4700e7e6f73aa14ce93925f5bebb2
SHA51247279cb730b2e3d8a908744c0b6b865856b14527aa1f7f6103ca58faae0dbf0e997a9be94a90a40147adbe09acc8833c8b6422c0e9f1a2ae1835dbbea8c77150
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2KB
MD5a73b489b3d6287344763bb065fe792ca
SHA1de2fe35bd932ce789837c4a2d9627fd62941b898
SHA2567298b8188e417816a538605b1ce5f5a453ab71586dc5f7d13d25721a0b518541
SHA512e2715931848b9135b8170497cd550a65a7722cf8e8aa3f8224725b626ec70a1827eb512b3e728c8c90f0cb200abcfe79de386c60901dc440d7c565eb7ef2d323
-
Filesize
5KB
MD59afe346b5f08d95c541811e723fb76fb
SHA16b48eb24a37381d398e11809579f6b7173c62504
SHA25666fdb1146ffe3248bbad3cb4c80f0780e61403d583b1914b2899a0b3dd82d198
SHA512ba5dafc85e051ecb7492ae7ebf6934f3092b8726489f3ff40d74701d046516ec9b11e9de87ef48442d519aa8ce9bfdd015e88a0f266b23d7e07bf2eb49840f75
-
Filesize
7KB
MD513583978fd32a77b355f1bf3bcf1c755
SHA1138b85f63b1fc6af68bcd39bc8094c2c0a034116
SHA2561bdb6b81cf6fd415483bc7a441c96bfad7f42236fa658f48488edfe0541fd9bb
SHA5127ddd8a3cd280f8292d332d09f55ad24485e80ec8be24d644b6fa1e4e23382c157dfdc171315da058318c069a87945a2d2c34e9a5ddf3ed4e5185961279acf580
-
Filesize
5KB
MD5d8ab27225816adb8ecf7bfa0f4bd4dc9
SHA1239f225fd145d5183f0db331d9c3c2de5c339b1e
SHA256cb2ad23b48713881fbc62db09e47c947eb2ed7a6600f1ba9199171c73b28b999
SHA512fbea2317d1e32813caef0068021b69799badbaa4cbbae2f205e3c0102d3f9c2161d7442a5419255dcfc4ddfc20e6b5fc4383935f56692896e3f3bdbe237584ce
-
Filesize
6KB
MD593d9a81502e8996bbb65f07f8353f2ca
SHA13fbae7f1b38574083f9e88f47a4c3fd847acfa24
SHA2569a91ef899e32dd8249b5cf76a05f11cfd8de1a66fffb02e31e65a03c90308a8a
SHA5120955508edff48591d6daeaa65759dad96418498cf90d5878cbc8bf9dcf74c6ae59c9f7c90c80b63888c60396bafcbb067c07ce1b1949908c5fa7afdea3c5b614
-
Filesize
24KB
MD50e78f9a3ece93ae9434c64ea2bff51dc
SHA1a0e4c75fe32417fe2df705987df5817326e1b3b9
SHA2565c8ce4455f2a3e5f36f30e7100f85bdd5e44336a8312278769f89f68b8d60e68
SHA5129d1686f0b38e3326ad036c8b218b61428204910f586dccf8b62ecbed09190f7664a719a89a6fbc0ecb429aecf5dd0ec06de44be3a1510369e427bde0626fd51d
-
Filesize
872B
MD520dffa116e08689d00f635d169d2610f
SHA1758c0a8a4cdde967bc56f4f664e65da8b8ad61a4
SHA2567d9a9e3806af4717fa9023f4ced6caf6dd8a3fadddc98516378007f7a056f3e9
SHA5120faeecf8cb6e01a2ebf10141aed9ad0b50fdd5183e9188435cf74ec3828f6988184d7a7e43823b718902f7a36df6983c187446046c5b904ca4219237ceb704d6
-
Filesize
872B
MD5f143787cbe731bf0f3f7ef28307f6ec3
SHA1d44f34e02b856f06f0878a95af7ae0d3ba01d3f3
SHA2567d0eb351c3dc9a89fae40c97cd4e4e496ac7fd8dab0c599987bd2997e2f6b37f
SHA512744f42169a4a722e5087e774802f0e3c07be10c49c39206830bc0e6867d2632f2aac7deb29778adb0bb0dafbda14f027bd23ca2588d70d4894443188c7baf6c0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
13KB
MD5a2ea4883731cebde2a8f18bfafd788d2
SHA154b685c418a767ab634e8878ede726fc47f0753d
SHA25697cc9f0beedef5cf8a28b2cd4c23031ca752b515ffed8ddeae7247e18b24509f
SHA512511a455273739fa54693cc8f9d9c082c02df2f0f0fab49f2f65ccd623e452e1f9ce424f6a78de363902fda6a2fba37c00ed51b7f1dbd71e103895aa9f1b8ece2
-
Filesize
12KB
MD534f462953a8c6cdee6da7c19b0aae8ae
SHA1002b2c37687accad16b2ddce8fa95f2f9f768100
SHA2567b2daa52dae5ae5c40ce8f7a77b32773edbcbb2ab44716b98731ee34ef74f2a0
SHA512b17c1b175ddc7b71183b45b5cbf7fb7977a96378ea36a563ecb5b822cf3ccc58458703c8c4d7918cdb764257d2f94fb1ab67459174754315c6e6dd527b3f4b83
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize12KB
MD55b0b144d34c98f9d0f174ecf1ae5eed3
SHA1d15e54c0ad14998174b2cffb3a9ffc7e942fccd6
SHA25652c9716061ae3ee68145845346357579b38f223042586936da3137ac7be15b90
SHA512c1d2eaea596d7a8fe0daf7a98c7567bf802562687b92c913444c469adb4a1ef85f7d7f5252e990db7b77439e03abb579d8a74e5cd40858172581e41976df334c
-
Filesize
32.2MB
MD52fb68a85e438da120cd7651bd512770f
SHA14d94214dc29a29626080433642d21ee7491560ce
SHA2561f6809fe04393c0688847c3f39f89328794c6a2896a6711fbe99c86a3dfbfbe2
SHA512098969359a12f8317c930022dbb39eb3e21cbd23583a68a1499444a9216cafdd916faaa55e554ef58d97ced1d66c5f9eb775d9ccf83a8bf29da5a4779792cdb3