Analysis
-
max time kernel
160s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 18:37
Static task
static1
Behavioral task
behavioral1
Sample
dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe
Resource
win10v2004-20230915-en
General
-
Target
dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe
-
Size
9.9MB
-
MD5
b4d3e6228c97521424c995e966fdc463
-
SHA1
89d2b50ff660208aae69809d80e0dfb3cd41e785
-
SHA256
dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b
-
SHA512
f96a5227a2e5f62de18c85fbeca65d4602c1149a69b4fc02958bfd55d27b0d344d6f5d4b3b065607d2e62f0f41218f41d67369cde91cd6d7590816bf6293e957
-
SSDEEP
196608:v4k+3sQ7gJUm1aIeMj1A+NVRDPImrRz2k/IRrhBu/GL2bBI6/jNU:v+Cx1aI3ji+NVmmrRSk/eru+LARi
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks for any installed AV software in registry 1 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Avira\Launcher dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Launcher dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AhnLab\V3IS80 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AhnLab\V3IS80 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 61 IoCs
pid Process 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 4656 msedge.exe 4656 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 488 identity_helper.exe 488 identity_helper.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe Token: SeRestorePrivilege 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3288 wrote to memory of 4240 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 90 PID 3288 wrote to memory of 4240 3288 dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe 90 PID 4240 wrote to memory of 1204 4240 msedge.exe 91 PID 4240 wrote to memory of 1204 4240 msedge.exe 91 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 3208 4240 msedge.exe 93 PID 4240 wrote to memory of 4656 4240 msedge.exe 92 PID 4240 wrote to memory of 4656 4240 msedge.exe 92 PID 4240 wrote to memory of 1200 4240 msedge.exe 94 PID 4240 wrote to memory of 1200 4240 msedge.exe 94 PID 4240 wrote to memory of 1200 4240 msedge.exe 94 PID 4240 wrote to memory of 1200 4240 msedge.exe 94 PID 4240 wrote to memory of 1200 4240 msedge.exe 94 PID 4240 wrote to memory of 1200 4240 msedge.exe 94 PID 4240 wrote to memory of 1200 4240 msedge.exe 94 PID 4240 wrote to memory of 1200 4240 msedge.exe 94 PID 4240 wrote to memory of 1200 4240 msedge.exe 94 PID 4240 wrote to memory of 1200 4240 msedge.exe 94 PID 4240 wrote to memory of 1200 4240 msedge.exe 94 PID 4240 wrote to memory of 1200 4240 msedge.exe 94 PID 4240 wrote to memory of 1200 4240 msedge.exe 94 PID 4240 wrote to memory of 1200 4240 msedge.exe 94 PID 4240 wrote to memory of 1200 4240 msedge.exe 94 PID 4240 wrote to memory of 1200 4240 msedge.exe 94 PID 4240 wrote to memory of 1200 4240 msedge.exe 94 PID 4240 wrote to memory of 1200 4240 msedge.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe"C:\Users\Admin\AppData\Local\Temp\dda5560bcd0f09fd8a06ec3008356e08bfd59bf3e667e2991874e51b25a9fa9b.exe"1⤵
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://down.360safe.com/setupbeta.exe2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff4d2446f8,0x7fff4d244708,0x7fff4d2447183⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,10035734182645443235,12474728876975323054,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,10035734182645443235,12474728876975323054,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:23⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,10035734182645443235,12474728876975323054,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:83⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10035734182645443235,12474728876975323054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:13⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10035734182645443235,12474728876975323054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:13⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,10035734182645443235,12474728876975323054,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 /prefetch:83⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,10035734182645443235,12474728876975323054,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10035734182645443235,12474728876975323054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:13⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10035734182645443235,12474728876975323054,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:13⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10035734182645443235,12474728876975323054,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4328 /prefetch:13⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10035734182645443235,12474728876975323054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:13⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2124,10035734182645443235,12474728876975323054,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5724 /prefetch:83⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10035734182645443235,12474728876975323054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:13⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2124,10035734182645443235,12474728876975323054,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5596 /prefetch:83⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,10035734182645443235,12474728876975323054,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5472 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3856
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4632
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53d5af55f794f9a10c5943d2f80dde5c5
SHA15252adf87d6bd769f2c39b9e8eba77b087a0160d
SHA25643e50edafcaaeae9fcd4dce5b99bf14fe79dae1401019443f31aa9ff81347764
SHA5122e2e09a00db732ff934da1e6ab8617fb3c8de482f9667a2c987435d0a5d67550b4bfd66e8b4475012b60908c24e39dff58e2f2ffa55f13ffc55caae1be630c71
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5308777053df3bf537057509f2762d7c5
SHA100290bfd8234d8ee3239cdd96ae2f38ccc70faf9
SHA25688db1ca2b0133e260bac39e90d88959db517a78733150a85c4c3a2f2b9644395
SHA512520738905bee59be9d89b9af97f4e089deb5cb7bdde5c86d83b626d94368e31213e8102ee418d65358f5bdd7fba56391cc8631456281a7977d69afab949d8ebb
-
Filesize
5KB
MD53d961ded792cfbad67ad719a5f0af753
SHA1153cb5f8bb2c389da51cae7aecf5ff67dfbba2bf
SHA256acbb3577f42cfaaee64a36c323d68d2734dedd187fab4b8728841585056a5872
SHA512949167dd138fb25e92381f7b270feb37c8c503a6c1b4094d35b1637cced53b3f79bc7b7332df821a98981187277d1bd088d1516175b09183a6648dad44c14d19
-
Filesize
24KB
MD510f5b64000466c1e6da25fb5a0115924
SHA1cb253bacf2b087c4040eb3c6a192924234f68639
SHA256d818b1cebb2d1e2b269f2e41654702a0df261e63ba2a479f34b75563265ee46b
SHA5128a8d230594d6fade63ecd63ba60985a7ccd1353de8d0a119543985bf182fdbb45f38ccc96441c24f0792ea1c449de69563c38348c2bedb2845522a2f83a149db
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57bcdcfe47306db50393497ef037fcc7c
SHA19ddd8d1ddc6360af587a76fceaccea425da3a82c
SHA256b3d4364a728035b1adf7f6648c498ca5431280310ba85a397f9c21fb6a481329
SHA512e55b2d36a418b556675ea4108dfaa6d188bac94a909115acea62300e416161c836d4ddf135020e43f11f08b42fb789e1e19da4a6b3aab8f5e0e4a733e5ea71d2