Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 06:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn-discordapp-com-attachments-png.versal.app/api/115032488403195089812009140610308505808jthWYF.pngex=65c7e960&is=65b57460&hm=cb2e0fe2bf22fce7667694c8345607a008ce37de7eef62da8e18dfe33520828f&
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://cdn-discordapp-com-attachments-png.versal.app/api/115032488403195089812009140610308505808jthWYF.pngex=65c7e960&is=65b57460&hm=cb2e0fe2bf22fce7667694c8345607a008ce37de7eef62da8e18dfe33520828f&
Resource
win10v2004-20231222-en
General
-
Target
https://cdn-discordapp-com-attachments-png.versal.app/api/115032488403195089812009140610308505808jthWYF.pngex=65c7e960&is=65b57460&hm=cb2e0fe2bf22fce7667694c8345607a008ce37de7eef62da8e18dfe33520828f&
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133512416335964249" chrome.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4864 chrome.exe 4864 chrome.exe 1364 msedge.exe 1364 msedge.exe 2648 msedge.exe 2648 msedge.exe 3168 identity_helper.exe 3168 identity_helper.exe 3360 chrome.exe 3360 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
pid Process 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 4864 chrome.exe 2648 msedge.exe 2648 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
pid Process 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4864 wrote to memory of 3392 4864 chrome.exe 85 PID 4864 wrote to memory of 3392 4864 chrome.exe 85 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 2084 4864 chrome.exe 91 PID 4864 wrote to memory of 5108 4864 chrome.exe 90 PID 4864 wrote to memory of 5108 4864 chrome.exe 90 PID 4864 wrote to memory of 3340 4864 chrome.exe 89 PID 4864 wrote to memory of 3340 4864 chrome.exe 89 PID 4864 wrote to memory of 3340 4864 chrome.exe 89 PID 4864 wrote to memory of 3340 4864 chrome.exe 89 PID 4864 wrote to memory of 3340 4864 chrome.exe 89 PID 4864 wrote to memory of 3340 4864 chrome.exe 89 PID 4864 wrote to memory of 3340 4864 chrome.exe 89 PID 4864 wrote to memory of 3340 4864 chrome.exe 89 PID 4864 wrote to memory of 3340 4864 chrome.exe 89 PID 4864 wrote to memory of 3340 4864 chrome.exe 89 PID 4864 wrote to memory of 3340 4864 chrome.exe 89 PID 4864 wrote to memory of 3340 4864 chrome.exe 89 PID 4864 wrote to memory of 3340 4864 chrome.exe 89 PID 4864 wrote to memory of 3340 4864 chrome.exe 89 PID 4864 wrote to memory of 3340 4864 chrome.exe 89 PID 4864 wrote to memory of 3340 4864 chrome.exe 89 PID 4864 wrote to memory of 3340 4864 chrome.exe 89 PID 4864 wrote to memory of 3340 4864 chrome.exe 89 PID 4864 wrote to memory of 3340 4864 chrome.exe 89 PID 4864 wrote to memory of 3340 4864 chrome.exe 89 PID 4864 wrote to memory of 3340 4864 chrome.exe 89 PID 4864 wrote to memory of 3340 4864 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn-discordapp-com-attachments-png.versal.app/api/115032488403195089812009140610308505808jthWYF.pngex=65c7e960&is=65b57460&hm=cb2e0fe2bf22fce7667694c8345607a008ce37de7eef62da8e18dfe33520828f&1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff864259758,0x7ff864259768,0x7ff8642597782⤵PID:3392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1856,i,18127301161309658344,4749252928307871757,131072 /prefetch:82⤵PID:3340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1856,i,18127301161309658344,4749252928307871757,131072 /prefetch:82⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1856,i,18127301161309658344,4749252928307871757,131072 /prefetch:22⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2916 --field-trial-handle=1856,i,18127301161309658344,4749252928307871757,131072 /prefetch:12⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2908 --field-trial-handle=1856,i,18127301161309658344,4749252928307871757,131072 /prefetch:12⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4844 --field-trial-handle=1856,i,18127301161309658344,4749252928307871757,131072 /prefetch:82⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4848 --field-trial-handle=1856,i,18127301161309658344,4749252928307871757,131072 /prefetch:82⤵PID:732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4712 --field-trial-handle=1856,i,18127301161309658344,4749252928307871757,131072 /prefetch:12⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4060 --field-trial-handle=1856,i,18127301161309658344,4749252928307871757,131072 /prefetch:12⤵PID:4732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3952 --field-trial-handle=1856,i,18127301161309658344,4749252928307871757,131072 /prefetch:12⤵PID:3824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=212 --field-trial-handle=1856,i,18127301161309658344,4749252928307871757,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3308 --field-trial-handle=1856,i,18127301161309658344,4749252928307871757,131072 /prefetch:12⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3460
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2648 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff8641146f8,0x7ff864114708,0x7ff8641147182⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,4882495628009103902,3133860020445379150,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,4882495628009103902,3133860020445379150,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,4882495628009103902,3133860020445379150,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4882495628009103902,3133860020445379150,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4882495628009103902,3133860020445379150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4882495628009103902,3133860020445379150,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4882495628009103902,3133860020445379150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:12⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,4882495628009103902,3133860020445379150,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3920 /prefetch:82⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,4882495628009103902,3133860020445379150,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3920 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4882495628009103902,3133860020445379150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3624 /prefetch:12⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4882495628009103902,3133860020445379150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4882495628009103902,3133860020445379150,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4882495628009103902,3133860020445379150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3512 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4882495628009103902,3133860020445379150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4882495628009103902,3133860020445379150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4264 /prefetch:12⤵PID:2264
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:876
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
824B
MD58b883b04f9e8be06d2a87bff7d74f241
SHA1853520f07465c127061154a4468ff7dc420cee09
SHA25618b0c623adea9d6d0c8808e85c4b9a6a295ed5303e2326622d59d45c8a9e907f
SHA512dd801150a13a6f4e1b893b8c39534b2b42155454ddc6985344a209cab856aa182b2a21792e5faed9ba7c9296ac3c869b497f8aed277dd01f5064145440b2e3c4
-
Filesize
6KB
MD5378c628964bbe93b24de29834614d186
SHA18b8c40139e1eda3e62cd6d84d39c075dcd357e97
SHA25626724006829965402934f7ad4f25af47b1dd27ba1c172fb0e895777166d08d8b
SHA512ecfb6d927783dbe50d94051c99f70e1c09f58e57e9abf90fa975d24bcca94d0bcdab519180fb92caa22289e56079e2d295913e852cd0646982bbfb30985908c5
-
Filesize
6KB
MD554adc734c2681598b7892f6e80b7328d
SHA1605819566e399591a75917949ee9eec5ebab9339
SHA2561ff571eb8469a364288fd46840b4cfa75bb041552edd771e4d2fc88d1e0c9081
SHA512d818aa44b0299baac947b1b045ed77e8468f9556da1025d3f1e7ea221370fb443c27d826572b3dcfadd792587dad1611c9afab99103e3b09cb99944fd5640d51
-
Filesize
114KB
MD5c88ce8c46aba6f40854a58191dde4bb6
SHA1bd66aec07b264abff13e94676899035aa7e9eb74
SHA2567dae711cb967337eaafd7866dcb9ca32ac74618e180bddc4c6345d89b97f0265
SHA5125be26b2d9d3a155b3c93c2b70beae51eb4937255b101642d19829fbb6fbd6bac50255b49cafe0ebad7e5c6b63d7ccb567f4fa567d040f9ca889fb346f538b740
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
152B
MD53e71d66ce903fcba6050e4b99b624fa7
SHA1139d274762405b422eab698da8cc85f405922de5
SHA25653b34e24e3fbb6a7f473192fc4dec2ae668974494f5636f0359b6ca27d7c65e3
SHA51217e2f1400000dd6c54c8dc067b31bcb0a3111e44a9d2c5c779f484a51ada92d88f5b6e6847270faae8ff881117b7ceaaf8dfe9df427cbb8d9449ceacd0480388
-
Filesize
5KB
MD57dcd4398ca89e1f5c2bfea0298403429
SHA1d2796f60f654b51736a508c90fe1365324e887e4
SHA256c50a60d78b4c9904061fa129c2790be23411e0e427bac644902ad969a8cc347b
SHA5122790af293db3c99f7e672a3b1a4b4d119e7977c0f90c065ea7132edc72432c25b4b71dd0af318df1df2cc445f9c035b1f32eeb420a5b0fbe9ac1bff65be74ef0
-
Filesize
5KB
MD5ec3e7f38271f82942bc75149530e0c9e
SHA1e577d03f7edb3e5de02dc53481d11842926100c8
SHA256532d402aacdf3caf33cd273fd2436e408303254000135a69bef99ebaa6fe526b
SHA5128ed8db07693ad6c49f6c719de2696d762afdf5c399cd229222f50e6cb6c36b28efd93c7aabf5cb98434228ea23db68cfb7a751a0f62d62bf549c127ed1b7fc7a
-
Filesize
5KB
MD5f3ba0fa3391753a729d7a04bc0e30ad4
SHA1aa75d4db4941496215377d38314f2ea7874f0ee8
SHA25696ac96f5fe37c02a7e8e001fa7849ccee4426b6aac17454f7b15ec511dbb7b07
SHA5126330502e0c54d4de52862dca382928fc74343c661dcaffe0890f52380ce26b28d3523044ed9c1793b94e70888658fb52c5816bee42d542afe8659e02290500e2
-
Filesize
5KB
MD5b0b6bedba106ea922c86b5c26c6bffbf
SHA108a094966795f901870908bd6ac7fa0f04d10f54
SHA256c29fd6e80fbc08bf6a83e5add808cf054a39030cad67de1d11ae145ed164601d
SHA5122b7f0763e79ca14ee511294894d22bd78333a04a3d908f7bfd06cab76232def5b14d1a962d078fc0b453ace1305409ec7ff725829384da957e570fcb8b1ef46d
-
Filesize
24KB
MD51b1b142e24215f033793d1311e24f6e6
SHA174e23cffbf03f3f0c430e6f4481e740c55a48587
SHA2563dca3ec65d1f4109c6b66a1a47b2477afaf8d15306a523f297283da0eccbe8b1
SHA512a569385710e3a0dc0d6366476c457927a847a2b2298c839e423c485f7dcce2468a58d20133f6dc81913056fb579957e67f63cf1e20b910d61816210447cd1f1f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5523044bac4784810f34c03bac471d5dc
SHA16c580a5315446b76bfc27218a8db41d20a1bf133
SHA25669f6a1c729a8c23bbdd403f84eeca95e534e7508617e0e5701a84abdc8c3eb97
SHA512a6c1b43fb1e1540a8d2e95b8d0b9a926e023ab88dbc52c1bfa374d2cede83f4004e9289e31af76588f65575119151315c236e1dfafec44b12023eba035c86857
-
Filesize
10KB
MD5597eef781069d20af2d2fcefc721b985
SHA13df41fcd22a6017ad66eb4e0bf2ff841a9b5aa5d
SHA2560c8c8f398641f2f749be979983860b35252fbd3e24a70e60a96260735a90ca02
SHA512d046b4e06af7c5f0461f17918e044de8cf0460cc6b6eb68cdec1021ac81886e576f8ae943db3059ebefcb6f350b79e1373283021a265528b207cc75e5840d56b