Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2023 13:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://propertymanagementsolutions.top/Contract-file
Resource
win10v2004-20231023-en
General
-
Target
https://propertymanagementsolutions.top/Contract-file
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133450486642549682" chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3552 chrome.exe 3552 chrome.exe 3496 msedge.exe 3496 msedge.exe 2400 msedge.exe 2400 msedge.exe 996 identity_helper.exe 996 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
pid Process 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe -
Suspicious use of FindShellTrayWindow 52 IoCs
pid Process 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3552 wrote to memory of 4128 3552 chrome.exe 87 PID 3552 wrote to memory of 4128 3552 chrome.exe 87 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 1104 3552 chrome.exe 90 PID 3552 wrote to memory of 3556 3552 chrome.exe 91 PID 3552 wrote to memory of 3556 3552 chrome.exe 91 PID 3552 wrote to memory of 2688 3552 chrome.exe 92 PID 3552 wrote to memory of 2688 3552 chrome.exe 92 PID 3552 wrote to memory of 2688 3552 chrome.exe 92 PID 3552 wrote to memory of 2688 3552 chrome.exe 92 PID 3552 wrote to memory of 2688 3552 chrome.exe 92 PID 3552 wrote to memory of 2688 3552 chrome.exe 92 PID 3552 wrote to memory of 2688 3552 chrome.exe 92 PID 3552 wrote to memory of 2688 3552 chrome.exe 92 PID 3552 wrote to memory of 2688 3552 chrome.exe 92 PID 3552 wrote to memory of 2688 3552 chrome.exe 92 PID 3552 wrote to memory of 2688 3552 chrome.exe 92 PID 3552 wrote to memory of 2688 3552 chrome.exe 92 PID 3552 wrote to memory of 2688 3552 chrome.exe 92 PID 3552 wrote to memory of 2688 3552 chrome.exe 92 PID 3552 wrote to memory of 2688 3552 chrome.exe 92 PID 3552 wrote to memory of 2688 3552 chrome.exe 92 PID 3552 wrote to memory of 2688 3552 chrome.exe 92 PID 3552 wrote to memory of 2688 3552 chrome.exe 92 PID 3552 wrote to memory of 2688 3552 chrome.exe 92 PID 3552 wrote to memory of 2688 3552 chrome.exe 92 PID 3552 wrote to memory of 2688 3552 chrome.exe 92 PID 3552 wrote to memory of 2688 3552 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://propertymanagementsolutions.top/Contract-file1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe2e419758,0x7ffe2e419768,0x7ffe2e4197782⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1660 --field-trial-handle=1876,i,6732665711126777865,14273562066806560440,131072 /prefetch:22⤵PID:1104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1876,i,6732665711126777865,14273562066806560440,131072 /prefetch:82⤵PID:3556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1876,i,6732665711126777865,14273562066806560440,131072 /prefetch:82⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3084 --field-trial-handle=1876,i,6732665711126777865,14273562066806560440,131072 /prefetch:12⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3100 --field-trial-handle=1876,i,6732665711126777865,14273562066806560440,131072 /prefetch:12⤵PID:1304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4556 --field-trial-handle=1876,i,6732665711126777865,14273562066806560440,131072 /prefetch:12⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3364 --field-trial-handle=1876,i,6732665711126777865,14273562066806560440,131072 /prefetch:12⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5036 --field-trial-handle=1876,i,6732665711126777865,14273562066806560440,131072 /prefetch:12⤵PID:2892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5624 --field-trial-handle=1876,i,6732665711126777865,14273562066806560440,131072 /prefetch:82⤵PID:4184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 --field-trial-handle=1876,i,6732665711126777865,14273562066806560440,131072 /prefetch:82⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4768 --field-trial-handle=1876,i,6732665711126777865,14273562066806560440,131072 /prefetch:12⤵PID:4572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 --field-trial-handle=1876,i,6732665711126777865,14273562066806560440,131072 /prefetch:82⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3920 --field-trial-handle=1876,i,6732665711126777865,14273562066806560440,131072 /prefetch:12⤵PID:4640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5184 --field-trial-handle=1876,i,6732665711126777865,14273562066806560440,131072 /prefetch:12⤵PID:4696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3084 --field-trial-handle=1876,i,6732665711126777865,14273562066806560440,131072 /prefetch:82⤵PID:2180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2512 --field-trial-handle=1876,i,6732665711126777865,14273562066806560440,131072 /prefetch:12⤵PID:4648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2668 --field-trial-handle=1876,i,6732665711126777865,14273562066806560440,131072 /prefetch:82⤵PID:1156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4772 --field-trial-handle=1876,i,6732665711126777865,14273562066806560440,131072 /prefetch:82⤵PID:368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5856 --field-trial-handle=1876,i,6732665711126777865,14273562066806560440,131072 /prefetch:82⤵PID:1212
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3672
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0x40,0x128,0x7ffe1f8046f8,0x7ffe1f804708,0x7ffe1f8047182⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,9914625330542031824,11528688198660537677,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,9914625330542031824,11528688198660537677,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,9914625330542031824,11528688198660537677,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9914625330542031824,11528688198660537677,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9914625330542031824,11528688198660537677,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9914625330542031824,11528688198660537677,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9914625330542031824,11528688198660537677,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,9914625330542031824,11528688198660537677,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3536 /prefetch:82⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,9914625330542031824,11528688198660537677,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3536 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9914625330542031824,11528688198660537677,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3556 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9914625330542031824,11528688198660537677,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9914625330542031824,11528688198660537677,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:3924
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:416
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312B
MD5d590bc58b21122931c11180cf3f0fb1d
SHA1940164207619c43e1451c24d1f48c24cac77eebc
SHA256509e955b2a625a0b9bd56c2c1f5958ff520a25d55e6ef796f12bdb4985fd8582
SHA512d8458afbe8496efc52a8fecdc2a7d489b8290f85fe88ac0709d5c07c9d617a33387765f2ba01364c0e5805c904d4722578759de5d81c45387fa9387527dfeab2
-
Filesize
408B
MD575ea4a940f8e3861367b3afda886ebfe
SHA16ab45ce71e81d5678025cd49be87b07bea33deab
SHA256e9159749b57137d227f7a80b3b27c17a0d10e321f29e2818ad956d4c26460153
SHA512737ae1f2ff69ac77fcc306eb1e08c30c26dcc0cea4eca0313384c9880422656e4e591e0e9963381073c7c511b409fab5cafb86f4dd439ea4dad6d4d7b68fef50
-
Filesize
264KB
MD595661617c7dc9131138af7d09224fa6d
SHA13dc9b0fae722c8a2ab34ca9c2cadbb1544100035
SHA256ec701f439b1ea3d0b20e4206ca76886333806ed9c4f29e62f216382557d1fcdc
SHA5124341fe4c7040c7c284eb5de501c2200dcc9ce3a70a1f3e669725df8f52a93886ee1f25d7c23c31a78b5ae07722f935a1c3d9603ef40723b065352151bbdb712b
-
Filesize
3KB
MD5bbf440a0dae2eebb3329db9dfc555082
SHA141fa6560e1c886d9b30ad8adba6e8f46cbc75d9a
SHA2568ec2730853bd9d4d8d825c8ca698e15028c4e509d0815cdefa0fe097535e5a27
SHA512839c2606ab42f5571cb729dd3c13e36cfc8d6759137dfa318b5451090c6500d0317d685498a8c93e33076f1c81eca79fbef0684cb821beb7a6b57a2951eaef71
-
Filesize
3KB
MD59662663456d13c8812679edf83796600
SHA1eb727af7ab3759866205a18f13cbf7d9951ee8cf
SHA2563ae3c4b9740813f4194aeee873d5c646be7ecfb1f3f26befa298833a20648f79
SHA5129dfa50df11f68652a5328eef01fe22cbac2496c660e265264f5e786d46c359f7c5238bd354c6fa1dad9222125c9a19b615d01da49ef18f548de65288dfc581fd
-
Filesize
1KB
MD56aaf2a7ca3360e54505b85bbf43323f2
SHA1af5fd3c4f695a1c254a72049e61eb620c8b67e95
SHA256d5a4e1ad9dbef73559997260bbaa5e49fe13b50bcac728ade17aef345b893c29
SHA51227a34a45ebf6e9ea6b04d3d997216402e10468feb989d9d63ed0b599c8c60f649bceb888219d0fb5f98a98787b7b10f45238e75fd1d8c9ede2f9ce41b72ece0f
-
Filesize
874B
MD57eca4a95f8e053d6084195aada7e5e6e
SHA17b3dad035e0196f546b6d532f6cf1feea8e12ee9
SHA256aff3a7e19885a237adc80905786ebde7387e2d87c60c9689ce7b8db24116a232
SHA512dd394318e2e90443cf0da96705881039fbe0f3f3b3dc02527a05de6a6370a7157a642978ad54e372f82fbb042074f51d352662c38b0c115b7fec1250bfe1c4cd
-
Filesize
5KB
MD5d06d702e9fe72e19c42191539bfb3cc6
SHA1d3c8d8c8cc7836f56737f3d2f40c8ec4a6290c82
SHA256ba15bd3e590ec4827a237c46df6c186acf48e75eef2966b274064f2caef0d6f5
SHA512af316404d26617b7712d085708e501ac8354cfcb53e0b1647e3c1f627b3f6f46b9baa8e8bbc68d20780931998c45db90f501d5e14fcfb16aa50790559ce9ca59
-
Filesize
6KB
MD57342f8ffe612715688130dd4134f8274
SHA1ecc280e61cc747b81ad08b591210f3cb64287ab6
SHA2564d1c3187bb3bd2c175f68ffd83353cebf8dd6edb164a901586db4d21dacad006
SHA5128192b224017216aee5ce5bf15878c6f3ffd78d969e93fdc5a121b0485c3b1a6beccce2778713e67f8a2cda8c68fe5fe86d3874541bfb591fdf9db082c4db7f13
-
Filesize
6KB
MD509f8ee58522a45c763eb1f3a9c0935e0
SHA16d8840c5621dcd5ff9ea335cb0b6af9e79db068f
SHA2560be3b9daff8bfa9df48ceead68bc59490f9735854cfb0be4aebd19fd7fc729dc
SHA51203c72576f6edeb2d27d09da0e8f1f953e212c73d47e5fbdcc263e4eb79e5822680ae77edecbfd88f9febfd06537f4a8a92848b659f01ba4e847b0dcd354c44b6
-
Filesize
6KB
MD581168269701ad00660631e4f053dfcf9
SHA1e319026f7d04c5149ba745e8688f85bf73ce6b3c
SHA2564ce1c34ca27ecdeefc3d73643e8fe0d7a7f18d007cf4b9f2fa205d127003c064
SHA512ed0a2d8a4dbc87c9f5f330f46d4ebb7365aca40d33da98a63851aea5464137cebe211e553169227c41db9c5b3ff6ec9d86252ecd7faf6aef8e63be9b6418bedf
-
Filesize
6KB
MD5a29b8d3a2f597200c77ad1088cd51fda
SHA1f1a80babcebc2dcc2169fc42fa9defbc8b803dab
SHA256b1531e50dd6ae919fffefb33054b3d6efeb378c83c74ba7b5c063ec6f15e05ee
SHA51267dbb90923069e3f86cefb53ae041ea97847f413e8ef01a898d51841d78a29dfbc1ef53f54b2bec98e3948a14c1a9142c28010aa7e0eb77249cbec9c65aeeb05
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\d17d4231-a9e0-44f0-975d-a117c829ba42.tmp
Filesize6KB
MD50faa94be21e7ea569fcb3c12631f8471
SHA1bedbe753b8121b251956d9996736601141087c2c
SHA2569b5e4206b6aa5a6940005ac6d48ae7009a088742bf4de11292195059a6c0efc7
SHA512ca94e4bfd4832ffbc0f7e8370e62fff6a5d3cad61c308c73f581c90bd1407593d4315471fb6a6eec3518b53bf3ba6296112a60a95accf4c56f1d183520bed265
-
Filesize
109KB
MD53eee2198ee2b3a6bb6327c061d84b286
SHA1ecc6fd08c74885e1f47faa1214b5e7f6df910a83
SHA256e7a98d597d5ebdf7fd88706d9098d3f4b66a0cd081a7d17b366135e9db93e098
SHA5125e2136f316f6eaaacd54b86d7d7e24ccf1ef74bf8cc1ce8c82f678ac4d352bb77e780134d1d41ef04855fb2a60fce549ce7ef7bfdb57d7d7de403bfe21511227
-
Filesize
109KB
MD5929a0ece47d9b621a43a8b5e7dd8d165
SHA1f03ecb94207d957bc0e3cacbe4487aa016038f5e
SHA25685a7f6b1e3dc9fa837f4976bfc7d937776373f42e4fd8b6ea5f8f31bc236a753
SHA512f17f065c585e1bed6ed460579a518b417827ab0d56ba7509e1129360bd1d18bde26648277afebf287ac9fbe5a56bf1965b8da999ecda29e0f7f94c66f97e3ecb
-
Filesize
105KB
MD52ae2d2076f866185a1bd447dc97d409c
SHA10e48b4aac9e1a7d7173452e1829393b93348e99e
SHA2564adb958fe3d2709491f3df762325dbcea5f67bcf2d27e77278b88814363b32a0
SHA5126984c5ffcbe206d2e8ef7419169e5af7f5f1a7f9d7777a0374b14e9d30ad0114d12120f99841eda94633de81efe803ad328dfaa3ca940ef9af16cb7b2e28173a
-
Filesize
104KB
MD5ce03a461550a20ac5d778752edb22acb
SHA197315abe8ae701144ba30a01bf1ca89677e981ef
SHA2567604cdfbe610f53a40d16f4900fd2bdd418dbb6abd979aaac1cfd82596b44bfd
SHA512dec8794d32813dfc2faa0db9c5c6e75780dfa2ba1a395d5bacec95f107ddc474a44c02bf004e640446fd04663253d1ac22cad356ec12f7c3e85cc0d308857e21
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
152B
MD5f4787679d96bf7263d9a34ce31dea7e4
SHA1ebbade52b0a07d888ae0221ad89081902e6e7f1b
SHA256bfcadaffd49f5351acf68b8249b32270424bc2459125818492cd3224662a9a87
SHA512de3f3d1cd602bddb664bd0d2aecb661204dd239b278b1f03d6b9dca6f3d03bd3041ac42f4382f5edf5b310b17ff9ecddff59f16729e8c095625040a364252307
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5fb74cc7687f8fe7cc84c1a650428604c
SHA119704160102eb75fca232acdacc4d24ee3b4847f
SHA25628edcef7cbaeb2c41064ab0eec0a300d4053dfbd02735f350009cd58bdf4be55
SHA512f7034f08c06e62c7422ca46e7a78ed8ce29ee99c624bc0e508d55cf0f860f8f8049f7b600ed494400f3f8c7bc7198da0895c94e43ea60db959fd72316c301474
-
Filesize
5KB
MD5c06306d896523b8e2d037298af60aea0
SHA11c8d978165e04f72305217fa13843e479a1f0cab
SHA2568b0c045f1b53466e2900fd2f04bde261a369b1d47d7fd632491aa47e7d8ac761
SHA5122f1cdbdee0816350dde41f80478ba1657e2b2d03d6d0de6d8a313d3146c73e255a4a7fe57e84bd5ecd2cec167dbd286d1a60800e2ef2aeb4c2aaca444a597b14
-
Filesize
24KB
MD53a748249c8b0e04e77ad0d6723e564ff
SHA15c4cc0e5453c13ffc91f259ccb36acfb3d3fa729
SHA256f98f5543c33c0b85b191bb85718ee7845982275130da1f09e904d220f1c6ceed
SHA51253254db3efd9c075e4f24a915e0963563ce4df26d4771925199a605cd111ae5025a65f778b4d4ed8a9b3e83b558066cd314f37b84115d4d24c58207760174af2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD579f10d569e2a7962799e4f4eda916719
SHA1fe3fefcd1f4665ffb9662a2b73722cf2ca4e261f
SHA25670d908e6dfde741f3527ad3f6bcacee56fb8271a2a8b1453eaee4494d429debc
SHA5124b3cb14bac0a3e10400ac5bdbd59ee826390b94ac7282dafb441b9e1f5aa0424148dbd3730f150acabf5472c6dc857100952bdfa07f5ae520ae0906d9fde67dc
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84