Overview
overview
10Static
static
10Samples 6/...ca.exe
windows7-x64
7Samples 6/...ca.exe
windows10-2004-x64
7Samples 6/...4e.exe
windows7-x64
10Samples 6/...4e.exe
windows10-2004-x64
10Samples 6/...31.exe
windows7-x64
10Samples 6/...31.exe
windows10-2004-x64
10Samples 6/...4b.exe
windows7-x64
7Samples 6/...4b.exe
windows10-2004-x64
7Samples 6/...1a.exe
windows7-x64
10Samples 6/...1a.exe
windows10-2004-x64
10Samples 6/...18.exe
windows7-x64
1Samples 6/...18.exe
windows10-2004-x64
1Samples 7/...22.exe
windows7-x64
3Samples 7/...22.exe
windows10-2004-x64
3Samples 7/...41.exe
windows7-x64
10Samples 7/...41.exe
windows10-2004-x64
10Samples 7/...62.exe
windows7-x64
10Samples 7/...62.exe
windows10-2004-x64
10Samples 7/...c5.exe
windows7-x64
10Samples 7/...c5.exe
windows10-2004-x64
10Samples 7/...a6.exe
windows7-x64
10Samples 7/...a6.exe
windows10-2004-x64
10Samples 7/...64.exe
windows7-x64
10Samples 7/...64.exe
windows10-2004-x64
10Samples 7/...a5.exe
windows7-x64
10Samples 7/...a5.exe
windows10-2004-x64
10Samples 7/...0d.exe
windows7-x64
10Samples 7/...0d.exe
windows10-2004-x64
10Samples 7/...de.exe
windows7-x64
7Samples 7/...de.exe
windows10-2004-x64
7Samples 7/...de.exe
windows7-x64
10Samples 7/...de.exe
windows10-2004-x64
10Resubmissions
07-01-2024 18:26
240107-w3ameabffn 10Analysis
-
max time kernel
166s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2024 18:26
Static task
static1
Behavioral task
behavioral1
Sample
Samples 6/c4ec2c4d73a45bba85debe9fe243708bb52afd29dc95d7fdefed02cd34c375ca.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Samples 6/c4ec2c4d73a45bba85debe9fe243708bb52afd29dc95d7fdefed02cd34c375ca.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
Samples 6/c6befd3879040aeca88afd9b461177c9a3fc830f2020f2878696ddca0cea994e.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Samples 6/c6befd3879040aeca88afd9b461177c9a3fc830f2020f2878696ddca0cea994e.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Samples 6/c76d7f244175880387474af937c59ad2cbfec2f4bdfdefdf0a9d1def029faa31.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Samples 6/c76d7f244175880387474af937c59ad2cbfec2f4bdfdefdf0a9d1def029faa31.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Samples 6/c808c7043bbe6f22fdae5e9ad031db55e2ec385489a53ad3096985e53292244b.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Samples 6/c808c7043bbe6f22fdae5e9ad031db55e2ec385489a53ad3096985e53292244b.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
Samples 6/ca181f57edb3d99fbdfd1a512a783d266d479c2fd38ffea14742771df7ba2c1a.exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
Samples 6/ca181f57edb3d99fbdfd1a512a783d266d479c2fd38ffea14742771df7ba2c1a.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
Samples 6/cd22c1aabcafc40bf81d42b42e625e49eff9e0f928fa961e43573e1eb45ace18.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
Samples 6/cd22c1aabcafc40bf81d42b42e625e49eff9e0f928fa961e43573e1eb45ace18.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
Samples 7/d097ca2583425f648592138b57562334c0b83d3179634fd43a0b611bdf720122.exe
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
Samples 7/d097ca2583425f648592138b57562334c0b83d3179634fd43a0b611bdf720122.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
Samples 7/d0d97c70ea6e26b3708dc101a310f056d690bbc17306c493ccba4a6f00fad541.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
Samples 7/d0d97c70ea6e26b3708dc101a310f056d690bbc17306c493ccba4a6f00fad541.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
Samples 7/d3d18f34a1494d87502f0ea05c56f6194e50610bc71f53653e15c98d25e57e62.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
Samples 7/d3d18f34a1494d87502f0ea05c56f6194e50610bc71f53653e15c98d25e57e62.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
Samples 7/da52dc0f002d544115f1d64dbc1d7ec9569be150d59cfe0bfd3f6bb5aed54dc5.exe
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
Samples 7/da52dc0f002d544115f1d64dbc1d7ec9569be150d59cfe0bfd3f6bb5aed54dc5.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
Samples 7/dcf250dc8a9683cf5a3e7dfdb441b06e15b391a8c5d97b31431c650a715432a6.exe
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
Samples 7/dcf250dc8a9683cf5a3e7dfdb441b06e15b391a8c5d97b31431c650a715432a6.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
Samples 7/dd225dc0284234d7ec035b06461bb9e15a5851fa4414d0a3c67541297bef8c64.exe
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
Samples 7/dd225dc0284234d7ec035b06461bb9e15a5851fa4414d0a3c67541297bef8c64.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
Samples 7/dde59b015e0acd1910513cf1da07f3b17d6530816d663c102ed9ad6ab6d575a5.exe
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
Samples 7/dde59b015e0acd1910513cf1da07f3b17d6530816d663c102ed9ad6ab6d575a5.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral27
Sample
Samples 7/e396aa398fb1fa0f6c9db780211f758649e9a1f26bb5a2e7026b1cfec6ea9c0d.exe
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
Samples 7/e396aa398fb1fa0f6c9db780211f758649e9a1f26bb5a2e7026b1cfec6ea9c0d.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral29
Sample
Samples 7/e5474bdcb0a87bd6c1c74d6a2fd6cff6c8ff913248b84e22c1ef5e82cb6f5cde.exe
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
Samples 7/e5474bdcb0a87bd6c1c74d6a2fd6cff6c8ff913248b84e22c1ef5e82cb6f5cde.exe
Resource
win10v2004-20231215-en
General
-
Target
Samples 7/d3d18f34a1494d87502f0ea05c56f6194e50610bc71f53653e15c98d25e57e62.exe
-
Size
269KB
-
MD5
f97a56229d045c69e57ced05b232b47e
-
SHA1
6fc187c34b895c0ecbf357db2cd931b96d55623e
-
SHA256
d3d18f34a1494d87502f0ea05c56f6194e50610bc71f53653e15c98d25e57e62
-
SHA512
c1c2dc4d3e1226309b45b814bf6eb1f2d607ad2f4d9d2374f068bc44e899d74415a77d76316ef84e149a5f1b0bb8fe0ca03e46aed0fea240d1503bdab2f9cb70
-
SSDEEP
3072:cqBgyZEzcpiFToN/3rHpak/bjKVdRPBjgN1nPYkqoHUDIKNHQ44:c9FToN/7Hpak/HKpBjgN1jqfJH+
Malware Config
Extracted
redline
@oleh_ps
194.169.175.235:42691
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral18/memory/2720-1-0x00000000001C0000-0x00000000001FE000-memory.dmp family_redline behavioral18/memory/2720-103-0x0000000000400000-0x0000000000447000-memory.dmp family_redline -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4368 msedge.exe 4368 msedge.exe 4816 msedge.exe 4816 msedge.exe 5616 identity_helper.exe 5616 identity_helper.exe 5988 msedge.exe 5988 msedge.exe 5988 msedge.exe 5988 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2720 wrote to memory of 4816 2720 d3d18f34a1494d87502f0ea05c56f6194e50610bc71f53653e15c98d25e57e62.exe 96 PID 2720 wrote to memory of 4816 2720 d3d18f34a1494d87502f0ea05c56f6194e50610bc71f53653e15c98d25e57e62.exe 96 PID 4816 wrote to memory of 808 4816 msedge.exe 97 PID 4816 wrote to memory of 808 4816 msedge.exe 97 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4376 4816 msedge.exe 101 PID 4816 wrote to memory of 4368 4816 msedge.exe 100 PID 4816 wrote to memory of 4368 4816 msedge.exe 100 PID 4816 wrote to memory of 944 4816 msedge.exe 102 PID 4816 wrote to memory of 944 4816 msedge.exe 102 PID 4816 wrote to memory of 944 4816 msedge.exe 102 PID 4816 wrote to memory of 944 4816 msedge.exe 102 PID 4816 wrote to memory of 944 4816 msedge.exe 102 PID 4816 wrote to memory of 944 4816 msedge.exe 102 PID 4816 wrote to memory of 944 4816 msedge.exe 102 PID 4816 wrote to memory of 944 4816 msedge.exe 102 PID 4816 wrote to memory of 944 4816 msedge.exe 102 PID 4816 wrote to memory of 944 4816 msedge.exe 102 PID 4816 wrote to memory of 944 4816 msedge.exe 102 PID 4816 wrote to memory of 944 4816 msedge.exe 102 PID 4816 wrote to memory of 944 4816 msedge.exe 102 PID 4816 wrote to memory of 944 4816 msedge.exe 102 PID 4816 wrote to memory of 944 4816 msedge.exe 102 PID 4816 wrote to memory of 944 4816 msedge.exe 102 PID 4816 wrote to memory of 944 4816 msedge.exe 102 PID 4816 wrote to memory of 944 4816 msedge.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\Samples 7\d3d18f34a1494d87502f0ea05c56f6194e50610bc71f53653e15c98d25e57e62.exe"C:\Users\Admin\AppData\Local\Temp\Samples 7\d3d18f34a1494d87502f0ea05c56f6194e50610bc71f53653e15c98d25e57e62.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=d3d18f34a1494d87502f0ea05c56f6194e50610bc71f53653e15c98d25e57e62.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff031f46f8,0x7fff031f4708,0x7fff031f47183⤵PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,17854928221762546204,9618762147261315024,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,17854928221762546204,9618762147261315024,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:23⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,17854928221762546204,9618762147261315024,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:83⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17854928221762546204,9618762147261315024,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:13⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17854928221762546204,9618762147261315024,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:13⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17854928221762546204,9618762147261315024,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:13⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17854928221762546204,9618762147261315024,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3604 /prefetch:13⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17854928221762546204,9618762147261315024,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:13⤵PID:5168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17854928221762546204,9618762147261315024,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:13⤵PID:5176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17854928221762546204,9618762147261315024,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:13⤵PID:5392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,17854928221762546204,9618762147261315024,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:83⤵PID:5600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,17854928221762546204,9618762147261315024,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17854928221762546204,9618762147261315024,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:13⤵PID:5844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17854928221762546204,9618762147261315024,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:13⤵PID:5852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,17854928221762546204,9618762147261315024,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3060 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5988
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=d3d18f34a1494d87502f0ea05c56f6194e50610bc71f53653e15c98d25e57e62.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵PID:392
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff031f46f8,0x7fff031f4708,0x7fff031f47183⤵PID:4352
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57a5862a0ca86c0a4e8e0b30261858e1f
SHA1ee490d28e155806d255e0f17be72509be750bf97
SHA25692b4c004a9ec97ccf7a19955926982bac099f3b438cd46063bb9bf5ac7814a4b
SHA5120089df12ed908b4925ba838e07128987afe1c9235097b62855122a03ca6d34d7c75fe4c30e68581c946b77252e7edf1dd66481e20c0a9cccd37e0a4fe4f0a6fe
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5f0afb54123e54e7388aa04182d17b343
SHA1bbd0391a9dac6e3c7a983393ba16fc40d1704072
SHA25698cfdc701691d56b4586e14fc5a692b69e2f535541a13040dc3bb60eec6596ef
SHA512365119928596d7ab6b64fd75f13fd0a09a1aaf40a0c356e44292168b12c401e6ffa7f6ba0becc36e2e40e4f766d7f2d0f9bf3815c454e5741453ab14502e3de2
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
437B
MD505592d6b429a6209d372dba7629ce97c
SHA1b4d45e956e3ec9651d4e1e045b887c7ccbdde326
SHA2563aacb982b8861c38a392829ee3156d05dfdd46b0ecb46154f0ea9374557bc0fd
SHA512caa85bdccabea9250e8a5291f987b8d54362a7b3eec861c56f79cebb06277aa35d411e657ec632079f46affd4d6730e82115e7b317fbda55dacc16378528abaa
-
Filesize
5KB
MD58a90ed31c341827e151b2efa8e6f24b2
SHA1928fc8e439edc1ea2b2034286b622f97610953eb
SHA256641eacee8f282bd4733110003180db85ccfc4da728574bbd68f41c4e31de54c6
SHA5129965eb8fb7da6f8d6cd36d0845ea8da1a1d73765a7e0b3f30d415a060805ea748efd6b233b2326d6db46cb5b458071069fe38a87e57d7843007a439eb88f92c7
-
Filesize
5KB
MD5321c5667f03e79daba5b8aa34803129f
SHA1f9affa838bca4d13f133236ba6309879765034ef
SHA256031f1c9fb82c5b1f1ec5f262262df9a133b101165aac18dda0345960096044d3
SHA512ec3224d337bccfe56f2da4bfb124c0da98fdf710f32d7253ec9e96d45431f4a823ce3bbbfcb56b6a23a14ed723cb08a69f0948e891de22d8a26cf812f050f983
-
Filesize
6KB
MD5042c67d01a50a1e3187b7fa57f7545fe
SHA1501a2ace33c82c78a23ee6d054e4dea3902569fe
SHA256cea3b3d54fdf9812600f613d7d640b540c0724c37871714189a44aa1ea9947be
SHA512da6ad783dc5bd855c5ceb4b47fa9c3cf93d249e103ba21d303b8f9b6f343d4f03a874807b3bee6809e8d29d53ab1563e98558bf198824df810b618ad3f15c8df
-
Filesize
6KB
MD51db2c4f6aa74f3d35a83d7ebcb22dab5
SHA1ffa8f7effdd6f6674acb3e1db6845539554f4023
SHA2563426b8711748d6a00099eebef82719e1b3cec6d956147f5febe398c506378d75
SHA512823447e075b1284c5ee5346df1a09ccf64bb4cf253f420f0280a4d9c9965a915cf10c627f7be1cdf3a1be010051aa59de1b9859b8d0e227f9be152693171e539
-
Filesize
24KB
MD552826cef6409f67b78148b75e442b5ea
SHA1a675db110aae767f5910511751cc3992cddcc393
SHA25698fc43994599573e7181c849e5865f23b4f05f85c1115dff53c58764d80373fb
SHA512f18df18cab6b5ecd71b79c81a2a1fdac42cc9960f62f06ac25f4d6487792705f2766ee3a10239eaac940d090186e6bc820e4eb7a5ee138f6e5c1c64f951b960c
-
Filesize
371B
MD58f001c30a4960857ab226acb8583ab3b
SHA1e0e7bbf88ade799ebacd52a94c966f6507f092a6
SHA256b476dae4e44820c5c5936059b4c7e44aa5de6c3837aa740c48cf04d6e552b6ed
SHA51297b6a26b35d83b22108e41925d878af8e38a81acaa6fa8843a673a26a974b3ebc30c55fe636b6fdfd12e9de9f885fc18f5fb79584fb52c53e42b34200a326fc9
-
Filesize
203B
MD5cf2d2a85ed4da8c81ae0a234c353a32c
SHA126106718debff4e1678e773045c46bb3c807167e
SHA256b355176c7697e109aac0da923ba54a5365670061e88dc9d7275521f05ea0cbbf
SHA512b8f726ca0112b425a61b766303210eb56040b828de63ca4896c7f758347edca0b8d28ee5f67d93fd9050ba8fc0cf262996d65f41b9d71fbe10a6e47303ea896e
-
Filesize
203B
MD500ede53de713a6dc4df7f13427422ebe
SHA1db17e41bb82b29e08321eaeea58ba80b5d54d30d
SHA256f2d7f2b58044fa3d801824ecddc22a28f82f8767a0692734b18f6139f5af5ce9
SHA512152049c0c6c59412fb280042904905486adf25bd9560b1beb807f185113bdc731866046284e8224b0abc72ca9d68365a9fdff32ecd416b2a6ab88422d0c9e7ff
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51094ec35455b8c17d9f9d33b722a9c15
SHA10bc9ec755f5fdde9f52261093cd58f1f9355c261
SHA256599b3d5bab42d0e88c5ec277e16c80d26f10bffd03cc72455c18083b16c401d2
SHA512bbf6fbf08dd448d86f968f9368d953614fb6449120fe587f9562f1db871df34a9cf9ad54f7edfa96d3264739cacc66b93028bed9c943cf59d60651fdcd318631
-
Filesize
11KB
MD5938d07f992ca89b6bfcb99382b05191d
SHA163885029932cad268b02d7069ae3e15821b64410
SHA2564dc98e19256afca7d52cb839f9b8eb104dfffaa2b5d88797ef65567c399f2e74
SHA512f04d4e165a7d1aeabfb3eda3f96463ee1097836f8a5dd9eca98118ae6ce18da558bc64586aa01b6b4bcfd0103e52eef3f05f368cf27b555e40a66b096e0c1386