Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 08:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/moom825/Discord-RAT-2.0/releases/download/2.0/release.zip
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
https://github.com/moom825/Discord-RAT-2.0/releases/download/2.0/release.zip
Resource
win10v2004-20231215-en
General
-
Target
https://github.com/moom825/Discord-RAT-2.0/releases/download/2.0/release.zip
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 72 discord.com 73 discord.com 71 discord.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3073191680-435865314-2862784915-1000\{432BCF5D-FAF7-416B-92A3-A392A2865063} msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1900 msedge.exe 1900 msedge.exe 4284 msedge.exe 4284 msedge.exe 2564 identity_helper.exe 2564 identity_helper.exe 2648 msedge.exe 2648 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 3564 msedge.exe 3564 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
pid Process 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4284 wrote to memory of 364 4284 msedge.exe 84 PID 4284 wrote to memory of 364 4284 msedge.exe 84 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1864 4284 msedge.exe 85 PID 4284 wrote to memory of 1900 4284 msedge.exe 86 PID 4284 wrote to memory of 1900 4284 msedge.exe 86 PID 4284 wrote to memory of 4396 4284 msedge.exe 87 PID 4284 wrote to memory of 4396 4284 msedge.exe 87 PID 4284 wrote to memory of 4396 4284 msedge.exe 87 PID 4284 wrote to memory of 4396 4284 msedge.exe 87 PID 4284 wrote to memory of 4396 4284 msedge.exe 87 PID 4284 wrote to memory of 4396 4284 msedge.exe 87 PID 4284 wrote to memory of 4396 4284 msedge.exe 87 PID 4284 wrote to memory of 4396 4284 msedge.exe 87 PID 4284 wrote to memory of 4396 4284 msedge.exe 87 PID 4284 wrote to memory of 4396 4284 msedge.exe 87 PID 4284 wrote to memory of 4396 4284 msedge.exe 87 PID 4284 wrote to memory of 4396 4284 msedge.exe 87 PID 4284 wrote to memory of 4396 4284 msedge.exe 87 PID 4284 wrote to memory of 4396 4284 msedge.exe 87 PID 4284 wrote to memory of 4396 4284 msedge.exe 87 PID 4284 wrote to memory of 4396 4284 msedge.exe 87 PID 4284 wrote to memory of 4396 4284 msedge.exe 87 PID 4284 wrote to memory of 4396 4284 msedge.exe 87 PID 4284 wrote to memory of 4396 4284 msedge.exe 87 PID 4284 wrote to memory of 4396 4284 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/moom825/Discord-RAT-2.0/releases/download/2.0/release.zip1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff921f646f8,0x7ff921f64708,0x7ff921f647182⤵PID:364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,14794250819804542841,4061933813590690492,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,14794250819804542841,4061933813590690492,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,14794250819804542841,4061933813590690492,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14794250819804542841,4061933813590690492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14794250819804542841,4061933813590690492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,14794250819804542841,4061933813590690492,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,14794250819804542841,4061933813590690492,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2732 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14794250819804542841,4061933813590690492,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14794250819804542841,4061933813590690492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14794250819804542841,4061933813590690492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3548 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2184,14794250819804542841,4061933813590690492,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3996 /prefetch:82⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14794250819804542841,4061933813590690492,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14794250819804542841,4061933813590690492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2184,14794250819804542841,4061933813590690492,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14794250819804542841,4061933813590690492,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2184,14794250819804542841,4061933813590690492,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=1724 /prefetch:82⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --field-trial-handle=2184,14794250819804542841,4061933813590690492,131072 --lang=en-US --service-sandbox-type=entity_extraction --mojo-platform-channel-handle=5412 /prefetch:82⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14794250819804542841,4061933813590690492,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3108 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14794250819804542841,4061933813590690492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2144 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14794250819804542841,4061933813590690492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14794250819804542841,4061933813590690492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14794250819804542841,4061933813590690492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6452 /prefetch:12⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,14794250819804542841,4061933813590690492,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6648 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14794250819804542841,4061933813590690492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2184,14794250819804542841,4061933813590690492,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6408 /prefetch:82⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2184,14794250819804542841,4061933813590690492,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5064 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14794250819804542841,4061933813590690492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14794250819804542841,4061933813590690492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6512 /prefetch:12⤵PID:4932
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4752
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:828
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3984
-
C:\Users\Admin\Downloads\release\builder.exe"C:\Users\Admin\Downloads\release\builder.exe"1⤵PID:1996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5efc9c7501d0a6db520763baad1e05ce8
SHA160b5e190124b54ff7234bb2e36071d9c8db8545f
SHA2567af7b56e2f0a84ae008785726f3404eb9001baa4b5531d0d618c6bdcb05a3a7a
SHA512bda611ddba56513a30295ea5ca8bc59e552154f860d13fed97201cdb81814dd6d1bca7deca6f8f58c9ae585d91e450f4383a365f80560f4b8e59a4c8b53c327d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\330c1f57-ae82-4730-bdc0-6d1975d6674e.tmp
Filesize1KB
MD572dadc50eb147235c89be974243820a5
SHA136e155a0c787f0d0ea87330707a62780d7efe0b9
SHA256a3c6e87618f6def745ca97b6ef200a07521de470806f6fe021981798b275bb51
SHA512c806bbfec5e8c16858bcab8ea9bb4ffe7604193798434ff82e0d76127863cff5fcc35abba8bb655aa11275990928bf7c6d8de04f36b87f88587af62b5427ce9d
-
Filesize
265B
MD5f5cd008cf465804d0e6f39a8d81f9a2d
SHA16b2907356472ed4a719e5675cc08969f30adc855
SHA256fcea95cc39dc6c2a925f5aed739dbedaa405ee4ce127f535fcf1c751b2b8fb5d
SHA512dc97034546a4c94bdaa6f644b5cfd1e477209de9a03a5b02a360c254a406c1d647d6f90860f385e27387b35631c41f0886cb543ede9116436941b9af6cd3285d
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5cc7d1875ee5fbc8308e1af286f831beb
SHA1fa2fab39c4f802882715a56344bce4b90a66c24d
SHA256465f0c404a226177a1b908fd1ba64fd29a9bf1f3976336803438df1e96aa8d09
SHA512099ad39ca7f4386d7288630ac0e658a5cf5a488fcecaf491e7cc4362cf1903cfd60387069466b7e1f31d4aa9c554680a0ce3f8cf806f9a50956663d74c329841
-
Filesize
6KB
MD5dfd81d3b6d4c5bdebc23f81edbd6de5d
SHA17bd89218bdbec4e3413968fffadffc60c5a97938
SHA256a59c03cda6b5fa6347d43c75324f1a198f7545fa1c864a11063dbbbf98f18bb4
SHA512b77160b48f7771789020816255cb71ab9f3487a0f772502fb6579d83e040b605c82b75d40ab8bb3a7d68e2806b0a669859da1626309e1d3faea6690db06c66bc
-
Filesize
5KB
MD58cd70738fe67903d9579c0da627a29be
SHA188c4f87b0eea8a19a3e26f4b7b8e6a5d5abc6760
SHA25684fa79576b5b6ed01365b32afa70dc260e48478fc8e91822ff4b7201a894d14d
SHA512762e4018e07a67d76c974b54e280f7629265b37f601b8403104721a42eb45dbc05e78506c5b735aa65ad220b303f8aa10cdb225504321b99ce5ff39a5f69a25a
-
Filesize
24KB
MD5121510c1483c9de9fdb590c20526ec0a
SHA196443a812fe4d3c522cfdbc9c95155e11939f4e2
SHA256cf5d26bc399d0200a32080741e12f77d784a3117e6d58e07106e913f257aa46c
SHA512b367741da9ab4e9a621ad663762bd9c459676e0fb1412e60f7068834cbd5c83b050608e33d5320e1b191be1d809fef48831e0f42b3ecabd38b24ec222576fa81
-
Filesize
2KB
MD5d2b87b3f7547b0f8cbf98684fdeb9057
SHA1efb712310692f686b72fafb1135f0ab99752fd49
SHA256237e936d2899e98adddd5b5fc8ba0b87e4ca410226ff1ccd5e91bf2dc96753b9
SHA5128ffc75c7133b1ded3598c328f54b6eb885b2200ae1d9584d4fabed2dea4d3472832911933c97d0b48267490f2fdbee284d170ccbf9ca1d8f43bbd9e7dfb50544
-
Filesize
203B
MD5948dbd8a4b1dd0e2a90ff31b1cc5e23f
SHA1a2d79adb5e8475871b0ffcb4172e03444541b19b
SHA256471c4514a349fc8ba07b720b9915e44ce4291f0e5b701861b0d4922ef3c8fa29
SHA512707bb6ec5f5badc54b3862382d92603d9aa4f9cea7b6c113ca60a907bb86b645f135a556eb457c82212ef9337d201f5fa008ac8dc0e3cb0fd5bc714129707cf0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59b6b3f5c59246e38c97e62b23eee8117
SHA1051ed8bd9da23479653cf9d23c1c44fc33a54c33
SHA25662c3a80eef479206e8ee5dc0084d501e1fb9702985b4b3ae9ef50abe11b8a6ac
SHA512656ccda85ee1f1f24780b9ffb82562891160895675dab1e805c3490d8c285e609c477db16b91704a4d3b58e6b8d9cad47c5f0aa5b636a5162ce0fc3eccc73c04
-
Filesize
11KB
MD54d096563923aec9731566498ecc1bc09
SHA11ec14ab886c7672c4784eb35a1a853d21629a701
SHA256556c071e60e64d87fcf6b71e490bf59b85b0e2e80226e03a1895f1e33d42fe70
SHA512f7e87dab4ab327ec7a397abc24d8cfc1d3417072aa5a00f7d89c767995b97cc44cce53dabe3bd97055bc9005ab912532fc22a8d8f1839f5a5b7c0255b8c22dce
-
Filesize
12KB
MD54872d33ad0b16e924ad6cf4b44d6ed03
SHA1c8568286ea83bbf2edae2e702e6e98614c63fd42
SHA256c4762e92c30139fe63688b1f740b5800bdd8c59f6eaf9e8a998aa40f77ec1c68
SHA5126f01973c42df99c8965dea43392adfa6ebb38e7d648c5a982fdcd4c1e411e69ce3a60cc661583294deed28c5e132bf3ae76958e5bb28e813196b627413e0bd61
-
Filesize
10KB
MD57ae5db4912380f83bc7b08c7e2d30ddb
SHA1c0b1bebf88f390f5d196ed748108fb8407026af3
SHA256a86d61b20a50cc8078478cea0b28ce77b6ae50461b7fed47a12051674165ac8e
SHA512ff089723193b23e05dc9676b0824c0a5f4ce6ddff00496c150b9d54d1b308fbfd87e1e8a8fe75fe5be51d7266d02c278e71c8991a60d797afc68fa3bc4b67873
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
445KB
MD506a4fcd5eb3a39d7f50a0709de9900db
SHA150d089e915f69313a5187569cda4e6dec2d55ca7
SHA256c13a0cd7c2c2fd577703bff026b72ed81b51266afa047328c8ff1c4a4d965c97
SHA51275e5f637fd3282d088b1c0c1efd0de8a128f681e4ac66d6303d205471fe68b4fbf0356a21d803aff2cca6def455abad8619fedc8c7d51e574640eda0df561f9b