Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2023, 11:04
Behavioral task
behavioral1
Sample
0fb82af2f17ef2ee8f7e5bf6016682d0.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0fb82af2f17ef2ee8f7e5bf6016682d0.exe
Resource
win10v2004-20231215-en
General
-
Target
0fb82af2f17ef2ee8f7e5bf6016682d0.exe
-
Size
434KB
-
MD5
0fb82af2f17ef2ee8f7e5bf6016682d0
-
SHA1
7daf730681f98936e4edfaf3ab90d2592b6a14f1
-
SHA256
da74fff7f53e950ae33077458bec19850dfeb7fcaba018ffd352d294878a494e
-
SHA512
0cddeda0cdfee5e328db4b4f67d6098dcf04e4104ee01fc03b919e0faec64fa0053cfe77aaf489e51995dbc0578c4b9e2557181684236ee8184674373313631d
-
SSDEEP
3072:vb58ppAsP57Esm15aEsm15pb58ppAsP57Esm15p7Esm15aEsm15pb58ppAsPp:VwAGZ05aZ057wAGZ055Z05aZ057wA0
Malware Config
Signatures
-
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\drivers\gm.dls 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\drivers\gmreadme.txt 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\drivers\afunix.sys 0fb82af2f17ef2ee8f7e5bf6016682d0.exe -
Manipulates Digital Signatures 1 IoCs
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
description ioc Process File created C:\WINDOWS\SysWOW64\wintrust.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 0fb82af2f17ef2ee8f7e5bf6016682d0.exe -
resource yara_rule behavioral2/memory/1420-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/1420-9-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/files/0x000100000001db1c-14.dat upx behavioral2/memory/1420-108-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/1420-306-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/1420-824-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/1420-1243-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/1420-1281-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\d3d10core.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\wevtutil.exe 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\Windows.Networking.NetworkOperators.HotspotAuthentication.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\wscui.cpl 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\dinput8.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\KBDNSO.DLL 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\MbaeApi.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File opened for modification C:\WINDOWS\SysWOW64\msvcp140.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\rasgcw.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\sendmail.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\Windows.System.RemoteDesktop.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\WinSyncMetastore.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\cscript.exe 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\difxapi.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\GameBarPresenceWriter.proxy.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\KBDHE220.DLL 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\msimsg.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\sscore.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\WinFax.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\XpsRasterService.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\BthTelemetry.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\d3dim.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\DefaultPrinterProvider.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\gb2312.uce 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\JpMapControl.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\KBDPL1.DLL 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\ucrtbase.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\Windows.Globalization.PhoneNumberFormatting.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\cscapi.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\MapControlCore.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\perfnet.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\Windows.Management.Workplace.WorkplaceSettings.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\fontsub.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\sqlwid.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\KBDHE.DLL 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\KBDHEPT.DLL 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File opened for modification C:\WINDOWS\SysWOW64\mfc140u.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\objsel.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\shsvcs.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\Windows.UI.Cred.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\dxtmsft.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\ftp.exe 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\InkObjCore.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\lpk.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\mfcsubs.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\npmproxy.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\@EnrollmentToastIcon.png 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\adsldp.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\container.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\Windows.Networking.BackgroundTransfer.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\wscript.exe 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\AudioSes.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\dot3dlg.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\msjetoledb40.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\olesvr32.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\PaymentMediatorServiceProxy.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\PkgMgr.exe 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\scrptadm.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\Windows.Globalization.Fontgroups.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\capauthz.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\comsnap.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\msidle.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\Windows.Web.Http.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\SysWOW64\control.exe 0fb82af2f17ef2ee8f7e5bf6016682d0.exe -
Drops file in Windows directory 22 IoCs
description ioc Process File opened for modification C:\WINDOWS\DtcInstall.log 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\HelpPane.exe 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File opened for modification C:\WINDOWS\Professional.xml 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\winhlp32.exe 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\twain_32.dll 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File opened for modification C:\WINDOWS\SysmonDrv.sys 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File opened for modification C:\WINDOWS\system.ini 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File opened for modification C:\WINDOWS\win.ini 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File opened for modification C:\WINDOWS\WindowsUpdate.log 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File opened for modification C:\WINDOWS\lsasetup.log 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\mib.bin 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File opened for modification C:\WINDOWS\setuperr.log 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\sysmon.exe 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\write.exe 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File opened for modification C:\WINDOWS\PFRO.log 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File opened for modification C:\WINDOWS\setupact.log 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\splwow64.exe 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\WMSysPr9.prx 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\bfsvc.exe 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\explorer.exe 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\hh.exe 0fb82af2f17ef2ee8f7e5bf6016682d0.exe File created C:\WINDOWS\notepad.exe 0fb82af2f17ef2ee8f7e5bf6016682d0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2556 msedge.exe 2556 msedge.exe 924 msedge.exe 924 msedge.exe 2808 identity_helper.exe 2808 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1420 wrote to memory of 924 1420 0fb82af2f17ef2ee8f7e5bf6016682d0.exe 95 PID 1420 wrote to memory of 924 1420 0fb82af2f17ef2ee8f7e5bf6016682d0.exe 95 PID 924 wrote to memory of 4844 924 msedge.exe 96 PID 924 wrote to memory of 4844 924 msedge.exe 96 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 4972 924 msedge.exe 97 PID 924 wrote to memory of 2556 924 msedge.exe 98 PID 924 wrote to memory of 2556 924 msedge.exe 98 PID 924 wrote to memory of 1848 924 msedge.exe 99 PID 924 wrote to memory of 1848 924 msedge.exe 99 PID 924 wrote to memory of 1848 924 msedge.exe 99 PID 924 wrote to memory of 1848 924 msedge.exe 99 PID 924 wrote to memory of 1848 924 msedge.exe 99 PID 924 wrote to memory of 1848 924 msedge.exe 99 PID 924 wrote to memory of 1848 924 msedge.exe 99 PID 924 wrote to memory of 1848 924 msedge.exe 99 PID 924 wrote to memory of 1848 924 msedge.exe 99 PID 924 wrote to memory of 1848 924 msedge.exe 99 PID 924 wrote to memory of 1848 924 msedge.exe 99 PID 924 wrote to memory of 1848 924 msedge.exe 99 PID 924 wrote to memory of 1848 924 msedge.exe 99 PID 924 wrote to memory of 1848 924 msedge.exe 99 PID 924 wrote to memory of 1848 924 msedge.exe 99 PID 924 wrote to memory of 1848 924 msedge.exe 99 PID 924 wrote to memory of 1848 924 msedge.exe 99 PID 924 wrote to memory of 1848 924 msedge.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fb82af2f17ef2ee8f7e5bf6016682d0.exe"C:\Users\Admin\AppData\Local\Temp\0fb82af2f17ef2ee8f7e5bf6016682d0.exe"1⤵
- Drops file in Drivers directory
- Manipulates Digital Signatures
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.freeav.com/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9bc2a46f8,0x7ff9bc2a4708,0x7ff9bc2a47183⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,4533952757762173184,4044461923981346375,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:23⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,4533952757762173184,4044461923981346375,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,4533952757762173184,4044461923981346375,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:83⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4533952757762173184,4044461923981346375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:13⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4533952757762173184,4044461923981346375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:13⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4533952757762173184,4044461923981346375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:13⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2052,4533952757762173184,4044461923981346375,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5452 /prefetch:83⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,4533952757762173184,4044461923981346375,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 /prefetch:83⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,4533952757762173184,4044461923981346375,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4533952757762173184,4044461923981346375,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:13⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4533952757762173184,4044461923981346375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:13⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4533952757762173184,4044461923981346375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:13⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4533952757762173184,4044461923981346375,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:13⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4533952757762173184,4044461923981346375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1404 /prefetch:13⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4533952757762173184,4044461923981346375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:13⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4533952757762173184,4044461923981346375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:13⤵PID:5116
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.antispyware.com/2⤵PID:5036
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3780
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2156
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2fc 0x1501⤵PID:4288
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9bc2a46f8,0x7ff9bc2a4708,0x7ff9bc2a47181⤵PID:2080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54d6e17218d9a99976d1a14c6f6944c96
SHA19e54a19d6c61d99ac8759c5f07b2f0d5faab447f
SHA25632e343d2794af8bc6f2f7c905b5df11d53db4ad8922b92ad5e7cc9c856509d93
SHA5123fa166b3e2d1236298d8dda7071a6fcf2bde283f181b8b0a07c0bb8ba756d6f55fa8a847ca5286d4dbabc6dace67e842a118866320ac01bd5f93cccd3a032e47
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\016d140a-fd27-414e-8c8c-1ed2988254b0.tmp
Filesize1KB
MD5ee72ae4456c880fdf4ab8765ed15e47f
SHA178da6b059a1b3750dd4af3551127331237b80b5a
SHA256147b2b72d9d137bb2585d636904c44783e2d0912815b3cf4e65eda7b7453d410
SHA5127250f8bb246571606ea0651a560832564d743f118d0130e587c5d355ba4c3f596f3c6edc9eff1727015f7bd1eec84ec866e5811b1c4afd5dd94b3d89ebd12f1a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD58d8ef20f02cece7c912350b5f644deeb
SHA1e2910c69e363297ded6502549d6bd6d3d3914b67
SHA2561506a593d959ab5706a9b6c8acb4c8ba21aab37a5c90794eadc9f98560cf6e8e
SHA51278a54c3d14def91799882c7623b5916ccd142dd7e7df5bb7508f46d10089f52313b73a206c86dd0174cf52229e2f90bb9486fe9767f5abcc771b77a0cb2e63ad
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5bd3fdc1155bbab8bf1625fb3cd34131c
SHA19cca704c194cb2eab0b070ed585c835941da303f
SHA2561edb33ad8e6587c5030463dfa8359cd08026760ea0c5824f51894f15200c84d3
SHA51297cda98419c0388c06badce28fe7999791855f41073817a852fd61b7c253e9d32fde7f368253ced33971cb4aa004b6f29f205362a2c3ece10166b19f13552077
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5ebaa605b482cb449d3067f2cf05f632b
SHA1e2edf16e4781c60b4052006ac8e101367105febd
SHA25612e95ab6fd6a7ae9aa88625fb0fea2fdee3364da86620d6be1d73f402364d2be
SHA51222738c3d04b5939162ee73e2bdd6240076170db15cb5af37046f7a4c246b6a3a45d81963fe97dfeadddb424f45fe1b1fe7b0ab7070512e22e823acf62d6e69a2
-
Filesize
5KB
MD525fbc043d4bd86c8cfc77c8a2afce366
SHA16c9e90987ecf16d002a08c2cb14985eaa61bb06d
SHA256a70542f018e574afd34ad33b0a9d319e21727942a1a70cbc0c6fb7f59d3e4927
SHA51228d36c48bebd65d23d6b7dfc5cf9c9024e92898d695ac7c18a008ce15481beabea60ebb6f05c44d5695611fe2b9bc6d686e86383241f3a9683d3756ffb9eca07
-
Filesize
7KB
MD5c723d3ec200f33a25ae116130a68a727
SHA10e1c118687086decdeb547637765d7dbefcd4d77
SHA2562f1eca68373ae87fe58d5f941366eef616be58d827410afdea06821b04f3a855
SHA51273480d8f2f79e0d34dcd736344b168423d5a0414ea9a1eace0c1f836d94cf305692ab1056298b30656b295f343f2a440c35268f2a05ebe77072a55d187a106b8
-
Filesize
24KB
MD5c2ef1d773c3f6f230cedf469f7e34059
SHA1e410764405adcfead3338c8d0b29371fd1a3f292
SHA256185450d538a894e4dcf55b428f506f3d7baa86664fbbc67afd6c255b65178521
SHA5122ef93803da4d630916bed75d678382fd1c72bff1700a1a72e2612431c6d5e11410ced4eaf522b388028aeadb08e8a77513e16594e6ab081f6d6203e4caa7d549
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59fee84c8801e3929e5748157701568ae
SHA13229860c21d2f829d4d8194a30dd220a6bd6b696
SHA25643ceea14d8cabfb8a53592d72141479694d15404a7cf2e2c19dcd101d98eff83
SHA51292d472e5628f9dd25d8a3014568835dfb84029a3ef5d69ddba679261b869e79916be52e107a3e805891a12bc708123c1ff766eb5907ef955d147da2145632a95
-
Filesize
10KB
MD551ca602f46a663e73fb2d2abf35c620b
SHA12827a20c723df2b1acd5b219e43b6412c4893504
SHA25672a4060d218b7218f134ffb0530c1d4ceaf357b188171dd63af1507624694fa4
SHA51233e0e0529b3ae906c807eb52b62b64743a0336dc3325f8621dca8412aa0065b2d2c87f1ff7fc87386ea3012f1567964fe315de3a6a7115d17122e8acc3dd5e60
-
Filesize
29KB
MD5517ca3ec9123d769837cf5fa5dfe8eaa
SHA11fc64cbe5669907553e5df775706840386c439d9
SHA256eae99a5ac7f950b2727df383deb722515940d660faace0f780128b6baf8e493a
SHA512bc51f2f081577d44c8e897fd25137a71de89dffd5bc6f26ebabd14f316e40661cc4e14be6191a04a0d51623518d18c04764a16aeef3477c9e51cb02c886249e0
-
Filesize
407KB
MD5036e7dc4751c7eb672c1cfe8c977ed02
SHA18c08b1c23150aa2f38fe515b72e77dcf65937184
SHA25668a178bf0c713ffcea1907406cc3013b23d292e750dfa6bd13ddf5e1dde09b98
SHA512729f14c2abbd92000e5ea51d6983ac9d114fcba14c6d2e8b0f27b26fec559b30f3059f70f144931ca2583217a8b71445b4d6f61215daff44bce8394a47cb6e9b