Analysis
-
max time kernel
163s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 10:32
Behavioral task
behavioral1
Sample
58b2858fdbda4ec08d3929c12a74b0da.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
58b2858fdbda4ec08d3929c12a74b0da.exe
Resource
win10v2004-20231215-en
General
-
Target
58b2858fdbda4ec08d3929c12a74b0da.exe
-
Size
64KB
-
MD5
58b2858fdbda4ec08d3929c12a74b0da
-
SHA1
a36b66bc6f3cdbf0b024e340115f4b74527a458f
-
SHA256
576aeeabf41fca19877fae09bae568357041c9e7a0a42fa9889243be3fb3edcc
-
SHA512
414182fe9cddb874a402535b1d2a670843466da3d9c28c22e9b155228468d3d4af8d2a29c21c4565388484560131d04d82a4e3e33eab9ac6124106a88a3bf208
-
SSDEEP
768:ae2mxDMm+STZ5UW0Z080t0M0+4ZfucVI4la7kYw4JUM3i/EhWoyiSq:txft5aucVI4la4YJUM3XhWoyG
Malware Config
Signatures
-
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\drivers\afunix.sys 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\drivers\gm.dls 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\drivers\gmreadme.txt 58b2858fdbda4ec08d3929c12a74b0da.exe -
Manipulates Digital Signatures 1 IoCs
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
description ioc Process File created C:\WINDOWS\SysWOW64\wintrust.dll 58b2858fdbda4ec08d3929c12a74b0da.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation 58b2858fdbda4ec08d3929c12a74b0da.exe -
resource yara_rule behavioral2/memory/260-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/260-9-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/files/0x000100000001dab7-14.dat upx behavioral2/memory/260-23-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/260-25-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/260-110-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/260-111-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/260-308-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/260-553-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/260-985-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\SystemPropertiesAdvanced.exe 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\SystemUWPLauncher.exe 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\Windows.Devices.Background.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\dxilconv.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\mscandui.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\shgina.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\wimgapi.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\WMADMOE.DLL 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\WsmRes.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\batmeter.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\container.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\KBDUSR.DLL 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\wscript.exe 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\clb.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\iccvid.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\KBDRU1.DLL 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\msadp32.acm 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\vaultcli.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\KBDSORST.DLL 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\TSTheme.exe 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\winmmbase.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\edgeIso.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\IdCtrls.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\kbdarmph.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File opened for modification C:\WINDOWS\SysWOW64\mfc120u.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\msdt.exe 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\WSManMigrationPlugin.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\auditpolmsg.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\comsnap.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\KBDHEPT.DLL 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\BrowserSettingSync.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\mimefilt.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\cttunesvr.exe 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\msjter40.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\azman.msc 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\cmdext.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\kbdhebl3.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\msvcrt20.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\RpcRtRemote.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\cryptnet.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\FrameServerClient.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\htui.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\Windows.System.RemoteDesktop.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\wscinterop.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\cmstplua.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\fidocredprov.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File opened for modification C:\WINDOWS\SysWOW64\vccorlib120.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\AppVClientPS.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\scripto.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\sysdm.cpl 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\FwRemoteSvr.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\RMActivate.exe 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\smphost.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\SystemPropertiesComputerName.exe 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\Windows.Security.Credentials.UI.UserConsentVerifier.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\ActionCenterCPL.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\CameraSettingsUIHost.exe 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\enterpriseresourcemanager.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\wsock32.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\rendezvousSession.tlb 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\APHostClient.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\dhcpcsvc6.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\KBDFC.DLL 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\SysWOW64\sqlsrv32.rll 58b2858fdbda4ec08d3929c12a74b0da.exe -
Drops file in Windows directory 22 IoCs
description ioc Process File opened for modification C:\WINDOWS\DtcInstall.log 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\HelpPane.exe 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\splwow64.exe 58b2858fdbda4ec08d3929c12a74b0da.exe File opened for modification C:\WINDOWS\system.ini 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\explorer.exe 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\mib.bin 58b2858fdbda4ec08d3929c12a74b0da.exe File opened for modification C:\WINDOWS\Professional.xml 58b2858fdbda4ec08d3929c12a74b0da.exe File opened for modification C:\WINDOWS\setupact.log 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\sysmon.exe 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\twain_32.dll 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\bfsvc.exe 58b2858fdbda4ec08d3929c12a74b0da.exe File opened for modification C:\WINDOWS\lsasetup.log 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\notepad.exe 58b2858fdbda4ec08d3929c12a74b0da.exe File opened for modification C:\WINDOWS\PFRO.log 58b2858fdbda4ec08d3929c12a74b0da.exe File opened for modification C:\WINDOWS\SysmonDrv.sys 58b2858fdbda4ec08d3929c12a74b0da.exe File opened for modification C:\WINDOWS\WindowsUpdate.log 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\winhlp32.exe 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\hh.exe 58b2858fdbda4ec08d3929c12a74b0da.exe File opened for modification C:\WINDOWS\setuperr.log 58b2858fdbda4ec08d3929c12a74b0da.exe File opened for modification C:\WINDOWS\win.ini 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\WMSysPr9.prx 58b2858fdbda4ec08d3929c12a74b0da.exe File created C:\WINDOWS\write.exe 58b2858fdbda4ec08d3929c12a74b0da.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4748 msedge.exe 4748 msedge.exe 2436 msedge.exe 2436 msedge.exe 5500 identity_helper.exe 5500 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 260 wrote to memory of 2436 260 58b2858fdbda4ec08d3929c12a74b0da.exe 104 PID 260 wrote to memory of 2436 260 58b2858fdbda4ec08d3929c12a74b0da.exe 104 PID 2436 wrote to memory of 4656 2436 msedge.exe 105 PID 2436 wrote to memory of 4656 2436 msedge.exe 105 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 2312 2436 msedge.exe 106 PID 2436 wrote to memory of 4748 2436 msedge.exe 107 PID 2436 wrote to memory of 4748 2436 msedge.exe 107 PID 2436 wrote to memory of 3828 2436 msedge.exe 108 PID 2436 wrote to memory of 3828 2436 msedge.exe 108 PID 2436 wrote to memory of 3828 2436 msedge.exe 108 PID 2436 wrote to memory of 3828 2436 msedge.exe 108 PID 2436 wrote to memory of 3828 2436 msedge.exe 108 PID 2436 wrote to memory of 3828 2436 msedge.exe 108 PID 2436 wrote to memory of 3828 2436 msedge.exe 108 PID 2436 wrote to memory of 3828 2436 msedge.exe 108 PID 2436 wrote to memory of 3828 2436 msedge.exe 108 PID 2436 wrote to memory of 3828 2436 msedge.exe 108 PID 2436 wrote to memory of 3828 2436 msedge.exe 108 PID 2436 wrote to memory of 3828 2436 msedge.exe 108 PID 2436 wrote to memory of 3828 2436 msedge.exe 108 PID 2436 wrote to memory of 3828 2436 msedge.exe 108 PID 2436 wrote to memory of 3828 2436 msedge.exe 108 PID 2436 wrote to memory of 3828 2436 msedge.exe 108 PID 2436 wrote to memory of 3828 2436 msedge.exe 108 PID 2436 wrote to memory of 3828 2436 msedge.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\58b2858fdbda4ec08d3929c12a74b0da.exe"C:\Users\Admin\AppData\Local\Temp\58b2858fdbda4ec08d3929c12a74b0da.exe"1⤵
- Drops file in Drivers directory
- Manipulates Digital Signatures
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:260 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.freeav.com/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8563f46f8,0x7ff8563f4708,0x7ff8563f47183⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,14590318672725562527,12054355884612502934,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:23⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,14590318672725562527,12054355884612502934,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2508 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,14590318672725562527,12054355884612502934,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:83⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14590318672725562527,12054355884612502934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:13⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14590318672725562527,12054355884612502934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:13⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14590318672725562527,12054355884612502934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:13⤵PID:5204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14590318672725562527,12054355884612502934,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:13⤵PID:5360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14590318672725562527,12054355884612502934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:13⤵PID:5352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,14590318672725562527,12054355884612502934,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3596 /prefetch:83⤵PID:5484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,14590318672725562527,12054355884612502934,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3596 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14590318672725562527,12054355884612502934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:13⤵PID:5688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14590318672725562527,12054355884612502934,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:13⤵PID:5696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14590318672725562527,12054355884612502934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=212 /prefetch:13⤵PID:5972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14590318672725562527,12054355884612502934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:13⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14590318672725562527,12054355884612502934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:13⤵PID:4936
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.antispyware.com/2⤵PID:5932
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8563f46f8,0x7ff8563f4708,0x7ff8563f47183⤵PID:5944
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4428
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD584381d71cf667d9a138ea03b3283aea5
SHA133dfc8a32806beaaafaec25850b217c856ce6c7b
SHA25632dd52cc3142b6e758bd60adead81925515b31581437472d1f61bdeda24d5424
SHA512469bfac06152c8b0a82de28e01f7ed36dc27427205830100b1416b7cd8d481f5c4369e2ba89ef1fdd932aaf17289a8e4ede303393feab25afc1158cb931d23a3
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5683335eef63aad9c397e78975bb0dbc1
SHA124270a256b349f7f2abd047422d9ad412f64c975
SHA256ceb31eb395aa0f33063b9b110b08471818d216fc2e815c66c000483848b4d84e
SHA512b8db0a229cce0f62712b595b7b8f4328d051fce102c39a24a3dac45e9a321d8f4d664d826197b5d6cd04485fcf48b17ee617e6befb9bb352ba99f5aa26be9a1a
-
Filesize
5KB
MD5f6b9eb3834b9495941dec45e2d826158
SHA100a6cde0c2c028855e1bb1cd20ce9b97cc9f8aea
SHA256a2ae5d4c2065398fbccfbd2b475cb911189feedafde24215681c5132f559d9ad
SHA512f5b8b726bab1f45f3237ca41e9fdddd25b3d0bc114c72a3ce3eef7261b683746d11ad651157ffa04934a119c65ffc0af4ed9f01b5b3b742b7f66fde69a941669
-
Filesize
6KB
MD5de8355c94c7c7a402455b97e15b1fec6
SHA1dbc55922a624c08d9709ad7b38793186af3431ae
SHA2564ac975265417d415546a11765ad86d0ae6597fadba4b5b25e28210cdf4424046
SHA512f6e707ee9e459f69ca1f429db272f61e9b71c1080c8d703fc961b2c7e1a010a6bdcdd8156221402b7d374b31a162da7ee93763439bd48a534b49dd08164400e3
-
Filesize
24KB
MD535f77ec6332f541cd8469e0d77af0959
SHA1abaec73284cee460025c6fcbe3b4d9b6c00f628c
SHA256f0be4c5c99b216083bd9ee878f355e1aa508f94feb14aeebcfba4648d85563a7
SHA512e0497dbe48503ebbf6a3c9d188b9637f80bccf9611a9e663d9e4493912d398c6b2a9eab3f506e5b524b3dabbca7bb5a88f882a117b03a3b39f43f291b59870c8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5df53c82a86dcc97ea720f25b5ea2c683
SHA1e465be8a047d692e384767baa1edcdd0ddf4ea03
SHA256eee137d2645aa67833987afb2ff62a0ccdef328483e82d2bb87c26d3f98c1af4
SHA512b4f6ff4173fc58eb932da51e60572d6903e21ed419b278929f9f96c8d1b8b7a116a9eb7b4ed2cb528860bd8c874293d20b1a79541000a0fdd7b0871b7394df7d
-
Filesize
11KB
MD5669cd088460328a9682e4c6e51ebd642
SHA1601dff3ac335ad0ba8b4c7fa587bba98693dc970
SHA256801285df00c17445f104e5d1d43871212dbe2666470c3a8419ff7f2e48ac0555
SHA5122e83a69cd70fb524715005c7e7ab5d2e5727b0c8b7118c58a699624a4115fd8fdc200f07d639811edade62be90b3d803ab8b623a7c0d35d12fb64d5ac2b767bd
-
Filesize
28KB
MD565a2711502a468a55fe080af0e98ce34
SHA108595264a358645553ab3fe6c11b0a2aadf34778
SHA2563381947f755c91ac827bcd3b803926ea47e2c65f6cabac2ea3e2f48a8a5eb94f
SHA51240c82833aee72a983f848cc4cd90f5325d3249e492f07ed0b9db4f4d4a4e47343df5d5971a08efd72ae92299b36599ebacddb6a595655dbf2f89f2f4e2994578
-
Filesize
36KB
MD5615141291cf52b71391835fd37d40e75
SHA15984679b33a5e3edefbf788d96762dd0a45da53f
SHA2562c0e0cd3e5808f92d594058794fa75ce33843bd7d22ec7a2180600ff1ae967d1
SHA512e5eecda001683f7b6e47932a1eab25ebc4f0ba821d87ac1d679e19381436de04d82bcced64f28d9c376336e414ca40d1fcf0bc7dd4e8978249cfc38f87262490