Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
23/01/2024, 16:21
240123-ttwr6scfg2 623/01/2024, 15:37
240123-s2w78sbfdr 623/01/2024, 14:53
240123-r9g8lsbcgp 123/01/2024, 14:45
240123-r4wh2sbceq 123/01/2024, 14:42
240123-r3fffabcdl 1Analysis
-
max time kernel
327s -
max time network
328s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
23/01/2024, 16:21
Static task
static1
Behavioral task
behavioral1
Sample
Claim_3456.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Claim_3456.html
Resource
win10-20231215-en
Behavioral task
behavioral3
Sample
Claim_3456.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
Claim_3456.html
Resource
win11-20231215-en
General
-
Target
Claim_3456.html
-
Size
458KB
-
MD5
9e310a76299c0c8cba40a0bba76bd934
-
SHA1
7b1507b134ae06ca9182d23cbbd41cffe044473f
-
SHA256
0d7c8f449cb7261716940fd57bbe6d583aa210cb08440c66038ee83207f9c34e
-
SHA512
8eaffba06ed0aec2127dd47af3b5e1cc2467b4790f395b1ebf86779a46317dbb9a331d4dc7500cb8b8a50b7ba63ec79ff7aa2c68f8c5b18ff610c82cb1bb1c04
-
SSDEEP
12288:9UYf1Nq4RLGZtQ9g4fRqAx1GVU8Nk1XEU:JGELSQ955q8j8LU
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_Msft&Prod_Virtual_Disk\2&1f4adffe&0&000003\Service msedge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_MSFT&PROD_VIRTUAL_DISK\2&1F4ADFFE&0&000003 msedge.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_Msft&Prod_Virtual_Disk\2&1f4adffe&0&000003\HardwareID msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-334598701-2770630493-3015612279-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-334598701-2770630493-3015612279-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-334598701-2770630493-3015612279-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" iexplore.exe -
Modifies registry class 21 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-334598701-2770630493-3015612279-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 0000000001000000ffffffff OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-334598701-2770630493-3015612279-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-334598701-2770630493-3015612279-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-334598701-2770630493-3015612279-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-334598701-2770630493-3015612279-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = 0100000000000000ffffffff OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-334598701-2770630493-3015612279-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202020202 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-334598701-2770630493-3015612279-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-334598701-2770630493-3015612279-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-334598701-2770630493-3015612279-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\1\NodeSlot = "7" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-334598701-2770630493-3015612279-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\1\MRUListEx = ffffffff OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-334598701-2770630493-3015612279-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-334598701-2770630493-3015612279-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-334598701-2770630493-3015612279-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\1 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-334598701-2770630493-3015612279-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-334598701-2770630493-3015612279-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\1 = 8c003100000000008f57d46e110050524f4752417e310000740009000400efbec5525961375839832e0000003f0000000000010000000000000000004a000000000064982801500072006f006700720061006d002000460069006c0065007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100370038003100000018000000 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-334598701-2770630493-3015612279-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-334598701-2770630493-3015612279-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7 OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-334598701-2770630493-3015612279-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\SniffedFolderType = "Generic" OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-334598701-2770630493-3015612279-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-334598701-2770630493-3015612279-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3488 msedge.exe 3488 msedge.exe 4496 msedge.exe 4496 msedge.exe 4740 msedge.exe 4740 msedge.exe 4028 identity_helper.exe 4028 identity_helper.exe 1008 msedge.exe 1008 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2160 OpenWith.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid 4 -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe -
Suspicious use of SetWindowsHookEx 22 IoCs
pid Process 2160 OpenWith.exe 2160 OpenWith.exe 2160 OpenWith.exe 2160 OpenWith.exe 2160 OpenWith.exe 2160 OpenWith.exe 2160 OpenWith.exe 2160 OpenWith.exe 2160 OpenWith.exe 2160 OpenWith.exe 2160 OpenWith.exe 2160 OpenWith.exe 2160 OpenWith.exe 2160 OpenWith.exe 2160 OpenWith.exe 2160 OpenWith.exe 2160 OpenWith.exe 2160 OpenWith.exe 2160 OpenWith.exe 2160 OpenWith.exe 2160 OpenWith.exe 2160 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3488 wrote to memory of 4808 3488 msedge.exe 79 PID 3488 wrote to memory of 4808 3488 msedge.exe 79 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4620 3488 msedge.exe 80 PID 3488 wrote to memory of 4496 3488 msedge.exe 82 PID 3488 wrote to memory of 4496 3488 msedge.exe 82 PID 3488 wrote to memory of 3756 3488 msedge.exe 81 PID 3488 wrote to memory of 3756 3488 msedge.exe 81 PID 3488 wrote to memory of 3756 3488 msedge.exe 81 PID 3488 wrote to memory of 3756 3488 msedge.exe 81 PID 3488 wrote to memory of 3756 3488 msedge.exe 81 PID 3488 wrote to memory of 3756 3488 msedge.exe 81 PID 3488 wrote to memory of 3756 3488 msedge.exe 81 PID 3488 wrote to memory of 3756 3488 msedge.exe 81 PID 3488 wrote to memory of 3756 3488 msedge.exe 81 PID 3488 wrote to memory of 3756 3488 msedge.exe 81 PID 3488 wrote to memory of 3756 3488 msedge.exe 81 PID 3488 wrote to memory of 3756 3488 msedge.exe 81 PID 3488 wrote to memory of 3756 3488 msedge.exe 81 PID 3488 wrote to memory of 3756 3488 msedge.exe 81 PID 3488 wrote to memory of 3756 3488 msedge.exe 81 PID 3488 wrote to memory of 3756 3488 msedge.exe 81 PID 3488 wrote to memory of 3756 3488 msedge.exe 81 PID 3488 wrote to memory of 3756 3488 msedge.exe 81 PID 3488 wrote to memory of 3756 3488 msedge.exe 81 PID 3488 wrote to memory of 3756 3488 msedge.exe 81
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Claim_3456.html1⤵
- Modifies Internet Explorer settings
PID:3100
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9c1d23cb8,0x7ff9c1d23cc8,0x7ff9c1d23cd82⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1708,3602933045408583370,13932020502439335423,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1868 /prefetch:22⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1708,3602933045408583370,13932020502439335423,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2584 /prefetch:82⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1708,3602933045408583370,13932020502439335423,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,3602933045408583370,13932020502439335423,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,3602933045408583370,13932020502439335423,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,3602933045408583370,13932020502439335423,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,3602933045408583370,13932020502439335423,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1708,3602933045408583370,13932020502439335423,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3620 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1708,3602933045408583370,13932020502439335423,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5508 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,3602933045408583370,13932020502439335423,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,3602933045408583370,13932020502439335423,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3652 /prefetch:12⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,3602933045408583370,13932020502439335423,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,3602933045408583370,13932020502439335423,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3908 /prefetch:12⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,3602933045408583370,13932020502439335423,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,3602933045408583370,13932020502439335423,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1708,3602933045408583370,13932020502439335423,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3416 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1708,3602933045408583370,13932020502439335423,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1960 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1016
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4536
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4888
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4916
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\Claim_3456.html1⤵PID:4792
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9c1d23cb8,0x7ff9c1d23cc8,0x7ff9c1d23cd82⤵PID:2848
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\7b329843-5b02-4408-8f0d-b57b383d2d7a\Claim_3456\" -spe -an -ai#7zMap4694:156:7zEvent96021⤵PID:3132
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:2644
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe" /q /c respondents\ibidem.cmd1⤵PID:640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K respondents\suspect.cmd system star exe2⤵PID:244
-
C:\Windows\SysWOW64\replace.exereplace C:\Windows\\system32\\starr32.exe C:\Users\Admin\AppData\Local\Temp /A3⤵PID:4600
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bb88128b6b2d63f04c36ce68ed52d0a1
SHA129cd0515976a9249fc96a9d77c9986238cd1c2da
SHA25619341f9fde32349d43cf9951f118ebbff856499e0e6875101eaf2db37a7d7d8b
SHA512ab3071e116a32fc105a868fe9f3cd11cb282fc6cdc1e101b09c7f6269502f98b34b2f0a2ec32eb2b537073e2b20bd22cefd2fdcd4be87f8b169e6eed3bed1ae7
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
575B
MD553218d2e423ddfea1d39d30e39d07a82
SHA14bfee309bcd1295dab9e266aeecc119c1d688620
SHA256f88b16798e70c5692cf305277fc186821f97361b4237f592468f4458efb70b7c
SHA512244343a1f63fc068558c3406788c14a95096e0360a3b22b6d5d4ebed9ee7235e2c3deab365dca2f0ad6d9dd9caea4ce68ec8aca82a4ddc5f362aa4aee2da3618
-
Filesize
5KB
MD5bb808902908907acd4ab36be9218d077
SHA1c28e4e585972abc351acf68266d967f40fb3907b
SHA256de19d969a18207fb7270b1b42b805875b94c6df3fab6b0c45a414790933ae78c
SHA5121a9035c6eacfb579d42dfe9cd980abf7e76863919cf09bc085ac8f7bad14e2d87b68f08207424c788493887d1240b649bc43f4b25692ca24cdfc5eba202382eb
-
Filesize
5KB
MD5909f3f3978b68227e1bb4be437995b02
SHA1415f6384c81c16599f722c675f4598317436236d
SHA256aca93bd3357ac26c4e490d0b4847395800803736ab8144342bd0d15e304592ba
SHA512f6a5d80845884c5803783ba69141347ee10bb4098ce32eeb684c48fe5502193dd66783f335bdada3168bb8d249d1e0869370a3ed215d6b7e49abf5393a9f0063
-
Filesize
5KB
MD5bac1e5cded5cb557b43db727c2fdf9cf
SHA1e812fdf5dc4b79ea41559d866667d5dd339e9792
SHA256dc02270a7bf3220b3c96ee62a1ae8b0ccfba3dfbee426e9df8eeba33cc6baeca
SHA512597954c4bf623500a8cf844ecccc1001212c22416ecd393dd8f093bbc1bb641beff03a995559ddcf0c3c80b958f4a691d41ec161dbe84fdd4fcefa75499e742b
-
Filesize
4KB
MD5c0cb91e06e471fae87aa5c775c4434ff
SHA1200becb0e599edeb4df476b18690efc8f497260f
SHA256e8e58a61ab8f5e9e92b76105d1f5aa79f87177ab16b5f52d612d7be75e686995
SHA512ca28cef0833de5b59e3782acfd8ccb4e6750b70c731c0cdd77e84938025efdb254d224c29c8e002d993fbc55a2998b0d7d19cbc32c6734c729c7ba0fb79ca152
-
Filesize
25KB
MD587796f83a580ad1059639b7b6f48c978
SHA13aeb3452c1d42aa82dcc46fac0eff546266958ca
SHA256ca9281ab005e47fe20e132b81ccfbf7a5f0e6d845cd3412129bcb07cacb1397d
SHA512196d07ff37bf35b583ba80ef92e0277eee328925a77accb3dae1ca10a356a7924f49a7e6233db1b8b320eef6beeb9677ee7d642dd4bcdb2f1343cfe84fb186cf
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD579a8a2aed4885b012ecc97dcd488bbfc
SHA1e79dd395daf08da544157e754a6a786c4bbf9670
SHA25610d49798e77ed0aeab5bf668922b374a0beac1d355b432995d630e70ec156c76
SHA512726c20a91e9528c5f514856996e17caf16420e26fd0ba793e82f87806e9fe50fda975f6bdaede12cbca29707064988ce4dfe67d7ef5aa819a711be7abc6e4b89
-
Filesize
10KB
MD5be30d782ebc2e3cf98995671cff5c744
SHA12fbade293c5928030bfcc2c7372b582c60ddae9b
SHA256ae54ceb05ea30772e44eb95ebd7381a661fefd67dd8b10d806a235262c450d21
SHA5124746b12ec5de823f59654164ed41c90296dcef13c349bfa240ca2d9da20139e2b13ddc03aad5a1f43b0a65ecedc1da9d909edb8d91d28f601ebf2d4db3ee9914
-
Filesize
11KB
MD505997d1667d894b24b2c4abe389369ff
SHA16b8f1dd7b6aad083a797e1c2df53e3d30075da99
SHA25640d68ef2fe8e8b03f618659ad41f2b9218020f7bc2e297b94afafb3abafd2045
SHA5129c27159b01d1b91cd52b3c6fb5f62a9325d475ceb60ff30e7a0ccf6c6ad408c80f007a20b89d8da84ee5ba545a2cdf99d03418ac8bff332e2f9ce565566a173b