Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 16:26
Static task
static1
Behavioral task
behavioral1
Sample
ef1b9135e8a243a505f5d3028d71a922.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ef1b9135e8a243a505f5d3028d71a922.exe
Resource
win10v2004-20231215-en
General
-
Target
ef1b9135e8a243a505f5d3028d71a922.exe
-
Size
11.3MB
-
MD5
ef1b9135e8a243a505f5d3028d71a922
-
SHA1
c947a5c43b86c448ab98729a8059b53cfca83b3b
-
SHA256
935f60791863769c64b601ffd195d74ebfb84894fba303b3847d11b762ff8cf5
-
SHA512
5b791ca1477633e2c73f457d854bda964e478546c22aa8e527b737c0d47c1be282db7c3d1d03e3590e5603488d419a01c127afc62b296771d9ed2bb44a1b16c2
-
SSDEEP
196608:SbPk5HyC8k5h/wDdEoNiV4I/WWwA7mFMgWbPk5HyC8k5h/wDdEoNiV4I/WWwA7mK:SbPk5HPhJCFMgWbPk5HPhJCFMgsbPk56
Malware Config
Signatures
-
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\drivers\afunix.sys ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\drivers\gm.dls ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\drivers\gmreadme.txt ef1b9135e8a243a505f5d3028d71a922.exe -
Manipulates Digital Signatures 1 IoCs
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
description ioc Process File created C:\WINDOWS\SysWOW64\wintrust.dll ef1b9135e8a243a505f5d3028d71a922.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation ef1b9135e8a243a505f5d3028d71a922.exe -
Executes dropped EXE 1 IoCs
pid Process 4568 exc.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\MSNP.ax ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\Windows.Networking.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\Windows.UI.Input.Inking.dll ef1b9135e8a243a505f5d3028d71a922.exe File opened for modification C:\WINDOWS\SysWOW64\mfcm100u.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\newdev.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\TextInputMethodFormatter.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\mspatchc.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\EsdSip.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\l2nacp.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\odbcjt32.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\playtomenu.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\UXInit.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\efsutil.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\DisplayManager.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\KBDINBE1.DLL ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\KBDSMSNO.DLL ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\msjtes40.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\netcorehc.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\xcopy.exe ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\XInput9_1_0.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\apphelp.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\netsh.exe ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\qdvd.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\WiFiDisplay.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\Wldap32.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\xwtpw32.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\mssph.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\updatepolicy.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\wevtapi.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\wsmplpxy.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\ieframe.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\KBDRU.DLL ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\kernel.appcore.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\NetCfgNotifyObjectHost.exe ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\quartz.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\rpchttp.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\fvecerts.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\SystemPropertiesRemote.exe ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\Windows.UI.Immersive.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\psr.exe ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\FlightSettings.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\KBDDIV1.DLL ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\KBDPL1.DLL ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\secproc_ssp.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\XblAuthTokenBrokerExt.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\feclient.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\wmdmlog.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\wpnclient.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\KBDOGHAM.DLL ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\rundll32.exe ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\vcruntime140_clr0400.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\rdpbase.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\comcat.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\dmvdsitf.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\imageres.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\itss.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\KBDFR.DLL ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\migisol.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\pegi.rs ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\cnvfat.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\windows.internal.shellcommon.AccountsControlExperience.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\Windows.StateRepositoryUpgrade.dll ef1b9135e8a243a505f5d3028d71a922.exe File opened for modification C:\WINDOWS\SysWOW64\PrintConfig.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\SysWOW64\d3d8.dll ef1b9135e8a243a505f5d3028d71a922.exe -
Drops file in Windows directory 22 IoCs
description ioc Process File opened for modification C:\WINDOWS\win.ini ef1b9135e8a243a505f5d3028d71a922.exe File opened for modification C:\WINDOWS\WindowsUpdate.log ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\WMSysPr9.prx ef1b9135e8a243a505f5d3028d71a922.exe File opened for modification C:\WINDOWS\lsasetup.log ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\mib.bin ef1b9135e8a243a505f5d3028d71a922.exe File opened for modification C:\WINDOWS\setuperr.log ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\twain_32.dll ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\splwow64.exe ef1b9135e8a243a505f5d3028d71a922.exe File opened for modification C:\WINDOWS\DtcInstall.log ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\HelpPane.exe ef1b9135e8a243a505f5d3028d71a922.exe File opened for modification C:\WINDOWS\PFRO.log ef1b9135e8a243a505f5d3028d71a922.exe File opened for modification C:\WINDOWS\setupact.log ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\bfsvc.exe ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\explorer.exe ef1b9135e8a243a505f5d3028d71a922.exe File opened for modification C:\WINDOWS\SysmonDrv.sys ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\winhlp32.exe ef1b9135e8a243a505f5d3028d71a922.exe File opened for modification C:\WINDOWS\system.ini ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\write.exe ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\hh.exe ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\notepad.exe ef1b9135e8a243a505f5d3028d71a922.exe File opened for modification C:\WINDOWS\Professional.xml ef1b9135e8a243a505f5d3028d71a922.exe File created C:\WINDOWS\sysmon.exe ef1b9135e8a243a505f5d3028d71a922.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1912 msedge.exe 1912 msedge.exe 3848 msedge.exe 3848 msedge.exe 5604 identity_helper.exe 5604 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2304 wrote to memory of 4568 2304 ef1b9135e8a243a505f5d3028d71a922.exe 91 PID 2304 wrote to memory of 4568 2304 ef1b9135e8a243a505f5d3028d71a922.exe 91 PID 2304 wrote to memory of 4568 2304 ef1b9135e8a243a505f5d3028d71a922.exe 91 PID 2304 wrote to memory of 3848 2304 ef1b9135e8a243a505f5d3028d71a922.exe 108 PID 2304 wrote to memory of 3848 2304 ef1b9135e8a243a505f5d3028d71a922.exe 108 PID 3848 wrote to memory of 4940 3848 msedge.exe 109 PID 3848 wrote to memory of 4940 3848 msedge.exe 109 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 728 3848 msedge.exe 111 PID 3848 wrote to memory of 1912 3848 msedge.exe 110 PID 3848 wrote to memory of 1912 3848 msedge.exe 110 PID 3848 wrote to memory of 3472 3848 msedge.exe 112 PID 3848 wrote to memory of 3472 3848 msedge.exe 112 PID 3848 wrote to memory of 3472 3848 msedge.exe 112 PID 3848 wrote to memory of 3472 3848 msedge.exe 112 PID 3848 wrote to memory of 3472 3848 msedge.exe 112 PID 3848 wrote to memory of 3472 3848 msedge.exe 112 PID 3848 wrote to memory of 3472 3848 msedge.exe 112 PID 3848 wrote to memory of 3472 3848 msedge.exe 112 PID 3848 wrote to memory of 3472 3848 msedge.exe 112 PID 3848 wrote to memory of 3472 3848 msedge.exe 112 PID 3848 wrote to memory of 3472 3848 msedge.exe 112 PID 3848 wrote to memory of 3472 3848 msedge.exe 112 PID 3848 wrote to memory of 3472 3848 msedge.exe 112 PID 3848 wrote to memory of 3472 3848 msedge.exe 112 PID 3848 wrote to memory of 3472 3848 msedge.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef1b9135e8a243a505f5d3028d71a922.exe"C:\Users\Admin\AppData\Local\Temp\ef1b9135e8a243a505f5d3028d71a922.exe"1⤵
- Drops file in Drivers directory
- Manipulates Digital Signatures
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\exc.exe"C:\exc.exe"2⤵
- Executes dropped EXE
PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.freeav.com/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd70f746f8,0x7ffd70f74708,0x7ffd70f747183⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,14042908556344432338,11432972805899630069,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,14042908556344432338,11432972805899630069,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:23⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,14042908556344432338,11432972805899630069,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:83⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,14042908556344432338,11432972805899630069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:13⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,14042908556344432338,11432972805899630069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:13⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,14042908556344432338,11432972805899630069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:13⤵PID:5448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,14042908556344432338,11432972805899630069,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:83⤵PID:5588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,14042908556344432338,11432972805899630069,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,14042908556344432338,11432972805899630069,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:13⤵PID:5720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,14042908556344432338,11432972805899630069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4292 /prefetch:13⤵PID:5712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,14042908556344432338,11432972805899630069,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:13⤵PID:5932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,14042908556344432338,11432972805899630069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:13⤵PID:5924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,14042908556344432338,11432972805899630069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1748 /prefetch:13⤵PID:5828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,14042908556344432338,11432972805899630069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:13⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,14042908556344432338,11432972805899630069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:13⤵PID:2632
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.antispyware.com/2⤵PID:4564
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd70f746f8,0x7ffd70f74708,0x7ffd70f747183⤵PID:4052
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3260
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD584381d71cf667d9a138ea03b3283aea5
SHA133dfc8a32806beaaafaec25850b217c856ce6c7b
SHA25632dd52cc3142b6e758bd60adead81925515b31581437472d1f61bdeda24d5424
SHA512469bfac06152c8b0a82de28e01f7ed36dc27427205830100b1416b7cd8d481f5c4369e2ba89ef1fdd932aaf17289a8e4ede303393feab25afc1158cb931d23a3
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD55a4bfe0ec3dd83ae5c91d8b036110cc9
SHA117a2812e70d2b391e283d3c6901c49878c3b3925
SHA256653631f129c0eea8e6a727ae984dbf8f99e2d7a683f3901b4d4a278d702d2d16
SHA512ca1662610c9284a3c4c782ff8ea972130afa38ebcb353d0a708559e17ce2be838ee6e525fa6bb92ca8036830ae0d70ab42371c0ea84b5f76a8712d47d2359e6b
-
Filesize
5KB
MD57468b55f8ef7df6b9ba4a78ca2b0ee3f
SHA13415f07f47b1e6abfebcbdcee079c71a7abace6b
SHA256395397060bc033b7efe5c6cc8153fe7a5c526d53140fd8c56f05ffecbeb32962
SHA512851aa44b3b0e0349aacd7df8383ab045f9e8d8dc3b75ba1f4badadd001c78b4e8130a98dd16d2d380e116b23feef42c976d7e691b9c5c8f140f3090d78f06e9b
-
Filesize
24KB
MD535f77ec6332f541cd8469e0d77af0959
SHA1abaec73284cee460025c6fcbe3b4d9b6c00f628c
SHA256f0be4c5c99b216083bd9ee878f355e1aa508f94feb14aeebcfba4648d85563a7
SHA512e0497dbe48503ebbf6a3c9d188b9637f80bccf9611a9e663d9e4493912d398c6b2a9eab3f506e5b524b3dabbca7bb5a88f882a117b03a3b39f43f291b59870c8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD566372140514fdd04dec78c786fb675dc
SHA1d18b03274ecd7ed9bb2d9482a73379b63bb1327a
SHA256831678ad9d7cbe77ddd7b27cd78ba5c764558053cf33e64c6fe7e68d149d41c5
SHA512d2f454df36931cb47c2d25c8b36c30ba2057d652ae67635109f542dc9a1afefda01457c7789b3f563209f9db007e238b94d9a69604d2d20c31591b60e094a6d4
-
Filesize
28KB
MD53e22ca67984823dae153b8137366b455
SHA191be4bab9fe866bb9ded21798c1092cfdc25ef80
SHA2569fb945dd0c6fed6bd134abb3766be267a7c2b0a1bac1d98cb018e820f08d2bea
SHA512add16a93662a788c5271a0ed420f284e5102363b80a3e0a5d0d75a71818389462568f8ac371866d81dfbdc0bdbaea5573ec60609ce42a53c5897977cd8a6bf86
-
Filesize
1.7MB
MD5ca5ddff56a22e0f00b77244fb338826a
SHA1b85581c6c30c8039b92da544cfb0e4ad4b86562a
SHA256cf4f7620663e06ec89c0993ea83d2275c96c0878daf19285e59f3f645ad8ada4
SHA5125245c20ddee411e05cfeef65114cf42d024b3dd32a1b3adf5a0c25f83a489398788bc18489f8cecc077ee186fca99b19a7ff1141907af9aabd162867ab7123c7
-
Filesize
112KB
MD59c563d3ccea7e31207f2edc6e1705e91
SHA183796fdcdb307cf3916fa7563def0d409de83518
SHA2563bb025417e7a365e7c3db3ba65ce6e4e1019205c0b513b089e470f5a15eacf46
SHA51202b4941795dc4598791671f7fbe5e6d1cfd262683a4b49774081034269a05ff7fed086ad551d939e8836a36d316cc73038e3df5b929d7f25afef80233cec5db8