Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2024 19:03
Static task
static1
Behavioral task
behavioral1
Sample
8d1b0d9a04ed0ec29703abe2cb29e3e7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8d1b0d9a04ed0ec29703abe2cb29e3e7.exe
Resource
win10v2004-20231222-en
General
-
Target
8d1b0d9a04ed0ec29703abe2cb29e3e7.exe
-
Size
34KB
-
MD5
8d1b0d9a04ed0ec29703abe2cb29e3e7
-
SHA1
d07f0fac7361c54d4de1d42809524c0d66a077ae
-
SHA256
56657d0660933b2dcef3dfd048fca62cbbb2fb3d36658c13da26dcd0980c756a
-
SHA512
6e8a49883d4c753ec9fb2bf573fec6bd810af6723799a09717c0a6e4ecc2cd165b2c601f008e2004e4942a4159a22f0dec81e12f8084494126cad2003860cd14
-
SSDEEP
384:GBXUFh1yvN/uMmxDMm/QQgQAAwIIQQgQcF:MXUs1ZmxDMm/QQgQAAwIIQQgQcF
Malware Config
Signatures
-
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\drivers\afunix.sys 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\drivers\gm.dls 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\drivers\gmreadme.txt 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe -
Manipulates Digital Signatures 1 IoCs
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
description ioc Process File created C:\WINDOWS\SysWOW64\wintrust.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\GraphicsCapture.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File opened for modification C:\WINDOWS\SysWOW64\mfc100cht.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\rpchttp.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\quickassist.exe 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\srms-apr.dat 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\dmprocessxmlfiltered.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\MSAMRNBSink.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\pcbp.rs 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\RacEngn.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\srmshell.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\tbs.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\wbemcomn.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\wscinterop.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\AuthFWWizFwk.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\Microsoft.Bluetooth.Proxy.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\OneCoreCommonProxyStub.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\davhlpr.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\mfnetsrc.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\w32topl.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\wincorlib.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\wlidcredprov.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\WSClient.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\dpnathlp.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File opened for modification C:\WINDOWS\SysWOW64\mfc120cht.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\VscMgrPS.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\StateRepository.Core.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\DeviceUxRes.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\mmc.exe 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\SCardDlg.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\msorc32r.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\TpmCertResources.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\DefaultDeviceManager.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\JavaScriptCollectionAgent.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\mscms.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\KBDSL1.DLL 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\mstask.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\wusa.exe 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\KBDFI.DLL 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\MiracastReceiver.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\pots.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\NetSetupEngine.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\onex.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\WinRtTracing.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\PlaySndSrv.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\easwrt.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\EditBufferTestHook.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\iepeers.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\netshell.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\twinui.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\wmpeffects.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\AboveLockAppHost.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\msdmo.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\msmpeg2vdec.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\WerFaultSecure.exe 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\XInputUap.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\DevDispItemProvider.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\KBDNEPR.DLL 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\TrustedSignalCredProv.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\certlm.msc 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\KBDARME.DLL 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\PortableDeviceSyncProvider.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\rometadata.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\SensorsNativeApi.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\SysWOW64\basecsp.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe -
Drops file in Windows directory 22 IoCs
description ioc Process File created C:\WINDOWS\sysmon.exe 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File opened for modification C:\WINDOWS\SysmonDrv.sys 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\twain_32.dll 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\explorer.exe 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\mib.bin 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File opened for modification C:\WINDOWS\lsasetup.log 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File opened for modification C:\WINDOWS\setupact.log 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File opened for modification C:\WINDOWS\win.ini 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\write.exe 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\bfsvc.exe 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\HelpPane.exe 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File opened for modification C:\WINDOWS\system.ini 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File opened for modification C:\WINDOWS\WindowsUpdate.log 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\WMSysPr9.prx 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\hh.exe 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\splwow64.exe 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File opened for modification C:\WINDOWS\PFRO.log 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File opened for modification C:\WINDOWS\Professional.xml 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File opened for modification C:\WINDOWS\setuperr.log 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\winhlp32.exe 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File opened for modification C:\WINDOWS\DtcInstall.log 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe File created C:\WINDOWS\notepad.exe 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4668 msedge.exe 4668 msedge.exe 4144 msedge.exe 4144 msedge.exe 1892 identity_helper.exe 1892 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4504 wrote to memory of 4144 4504 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe 96 PID 4504 wrote to memory of 4144 4504 8d1b0d9a04ed0ec29703abe2cb29e3e7.exe 96 PID 4144 wrote to memory of 968 4144 msedge.exe 97 PID 4144 wrote to memory of 968 4144 msedge.exe 97 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4464 4144 msedge.exe 99 PID 4144 wrote to memory of 4668 4144 msedge.exe 98 PID 4144 wrote to memory of 4668 4144 msedge.exe 98 PID 4144 wrote to memory of 3064 4144 msedge.exe 102 PID 4144 wrote to memory of 3064 4144 msedge.exe 102 PID 4144 wrote to memory of 3064 4144 msedge.exe 102 PID 4144 wrote to memory of 3064 4144 msedge.exe 102 PID 4144 wrote to memory of 3064 4144 msedge.exe 102 PID 4144 wrote to memory of 3064 4144 msedge.exe 102 PID 4144 wrote to memory of 3064 4144 msedge.exe 102 PID 4144 wrote to memory of 3064 4144 msedge.exe 102 PID 4144 wrote to memory of 3064 4144 msedge.exe 102 PID 4144 wrote to memory of 3064 4144 msedge.exe 102 PID 4144 wrote to memory of 3064 4144 msedge.exe 102 PID 4144 wrote to memory of 3064 4144 msedge.exe 102 PID 4144 wrote to memory of 3064 4144 msedge.exe 102 PID 4144 wrote to memory of 3064 4144 msedge.exe 102 PID 4144 wrote to memory of 3064 4144 msedge.exe 102 PID 4144 wrote to memory of 3064 4144 msedge.exe 102 PID 4144 wrote to memory of 3064 4144 msedge.exe 102 PID 4144 wrote to memory of 3064 4144 msedge.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d1b0d9a04ed0ec29703abe2cb29e3e7.exe"C:\Users\Admin\AppData\Local\Temp\8d1b0d9a04ed0ec29703abe2cb29e3e7.exe"1⤵
- Drops file in Drivers directory
- Manipulates Digital Signatures
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.freeav.com/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd2f2746f8,0x7ffd2f274708,0x7ffd2f2747183⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,6869165878302462097,11087373356554999499,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,6869165878302462097,11087373356554999499,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:23⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6869165878302462097,11087373356554999499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:13⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6869165878302462097,11087373356554999499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:13⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,6869165878302462097,11087373356554999499,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:83⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6869165878302462097,11087373356554999499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:13⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1980,6869165878302462097,11087373356554999499,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4880 /prefetch:83⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,6869165878302462097,11087373356554999499,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5700 /prefetch:83⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,6869165878302462097,11087373356554999499,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5700 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6869165878302462097,11087373356554999499,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:13⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6869165878302462097,11087373356554999499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:13⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6869165878302462097,11087373356554999499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:13⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6869165878302462097,11087373356554999499,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:13⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6869165878302462097,11087373356554999499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1412 /prefetch:13⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6869165878302462097,11087373356554999499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:13⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6869165878302462097,11087373356554999499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:13⤵PID:788
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.antispyware.com/2⤵PID:912
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x10c,0x110,0x114,0xe8,0x118,0x7ffd2f2746f8,0x7ffd2f274708,0x7ffd2f2747183⤵PID:2628
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4816
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2516
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x308 0x49c1⤵PID:2240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53e71d66ce903fcba6050e4b99b624fa7
SHA1139d274762405b422eab698da8cc85f405922de5
SHA25653b34e24e3fbb6a7f473192fc4dec2ae668974494f5636f0359b6ca27d7c65e3
SHA51217e2f1400000dd6c54c8dc067b31bcb0a3111e44a9d2c5c779f484a51ada92d88f5b6e6847270faae8ff881117b7ceaaf8dfe9df427cbb8d9449ceacd0480388
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD5b90e0a4fc39c13ea3b1b5e3c150d7bef
SHA156f8835b487f93c65a7aeed49969934411dde303
SHA256554e5fe0145d9a277a21269d45a84fc2295e0dff9e57c109eb64fb25cb0162f5
SHA5128a9f494148086896d36c28fc971d85b06d47d532ea442f0ffbf3d5dcc339e4ed3d061c18e89c65717a141c2474c15a3a477a8ca33e1987a38a128aed32559255
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5c0141c88fe18e1e80474a32e5fc7d753
SHA11868cfd1d207e925aed6268c4df17f79fff1cf18
SHA2564db97c97ad87c3793fe32a8cac52899171f7c793d3802eb7cea042f38c5c5a8f
SHA512a9fdbda60c8eed237b66a706db094ed1a297f5c251d4c6bb4f03538a50803cd4b8f38c7e4dae6d836d2c66aec5733c09a67a92b78fdd5ef115d05a8d7d2f99ce
-
Filesize
1KB
MD52051767ae7e5488e4585fa8463b6e785
SHA1028763d01661d39f4cd78fbd584ded9397bd8c3b
SHA256d0022899bd2d8c5da836fea50d81f36ef9d5545c2a67319346670be62f578b35
SHA5128710cb55f4775d1ac9191ca3d69472ec2e16238b9f21b4947fa1fcd39b5b94b8dc683eec761b23abd5c60f2d564d0dc3bbc131a2e61b567ba41294cb6442a64a
-
Filesize
5KB
MD5c1fc1b01cfcc93fa4e9c314c45716d88
SHA1dba9a8c2ca0d03d928bf95a50f6a34b2518552a6
SHA256ffe68d882c4ac755ff280f9c5c088013e4ee3c4c99abece97272f670b1a326eb
SHA512f5671ad528d2fb7e092f7a6807461be9fd3d69aba13bc8f850f4ce3db5246366a468dcfa01b7170692488178d6e2309f26f7e63c5b13d475b089cf5941c13b14
-
Filesize
6KB
MD51e39c5251b3c8eaac118c44155794141
SHA19418f75b93333f4dc1d5dd2d171b06fa9fe22b1d
SHA2568e4daf225e3e1805a77b902cff8effbbaa066563d7eb243453b57e1fafdc05f3
SHA512f94b525ac83c19f5df319e3c030c602bbc73e343cc9fdd08f5ccaa267c4e9faf51705f8818074c9c7e46cda9520cfa362480c92d4451336d0563ef51988b918a
-
Filesize
7KB
MD5ba4dce0e0c9811749851aed7e3e1a408
SHA1850a3ae1146932af100c4484de812e230edb78a2
SHA256e5fcff4d84252755f1703f2c8da0519ae8db0e556c6fccf1f39ed41b717d329e
SHA51290c45399dee1514d0a963e866ed2065ea6e5e71e1b885ea64c14c5b57c4ac0d353970d66c58afdde9241f5fbca3059e8f6d4dfe57c3354526b1dacde4f0b394b
-
Filesize
24KB
MD51b1b142e24215f033793d1311e24f6e6
SHA174e23cffbf03f3f0c430e6f4481e740c55a48587
SHA2563dca3ec65d1f4109c6b66a1a47b2477afaf8d15306a523f297283da0eccbe8b1
SHA512a569385710e3a0dc0d6366476c457927a847a2b2298c839e423c485f7dcce2468a58d20133f6dc81913056fb579957e67f63cf1e20b910d61816210447cd1f1f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57c2b300950b0efad8f20658366ce1990
SHA1fb095933b9f3e7db3c26cc61d4c46b6b9ef7bfed
SHA25608cce8a89f36e5e2a78998be47a2d8ccfecada90002d02f692ee256b47e7c74b
SHA5127c069c32e143d3203de51f2936b9d4d2c8dd5098138cc59176acf3a39ade1e42b03bd51d1da7ec36fecacae5023739a18de7fcfda8cf358624800e1f5047cdbf
-
Filesize
10KB
MD56ac9d09d4ff8386807959c3db99ac0e3
SHA1825ea760be1e640903f4d1bedde32a76537c99e2
SHA256c72635434c4481c51ee4bdd7ad4c331e7f1120b53a3659d28dd91d5826c8ae60
SHA5122014dcc27713e78b13eff2a6ca4d4c5ae1b98ace0fc9ae506bc6a9851cc58dbc0e5e58002f7b2c8a8d67685dcf5f52921387990e09d42646f9a0e51655be0a52
-
Filesize
29KB
MD5bb9d299a215e4571251eda26f67b15da
SHA1ee531885f04357651b0c9e4b4e86f73d5d4e7f2d
SHA25611b1d9fd9a19a3861042ef88aa8980229fef46e2ee645e0cafb6cbad2b6a6e9a
SHA51289262ea489c6dd80b4ed25f1923073f9b9ce32e560ced7db6970788f68bfda50b6e42f1034dba8035267a4190d55c2d416d6fbcd81636e8ac3e417776251d02a
-
Filesize
6KB
MD55ef0465c820d1175d11cb46dc261b0a8
SHA1b0600fa570c1e2a1227122f68b5aeace433ae39d
SHA25692dafb3bceb77114c9105eb7d79589ea254cdb14cd54a766f0f1077b662ef7c4
SHA5122fb44ad410d8653582cebd411edbe7c283896b797c5030a940e6992c012b8ff79d5c4a1a682ee24990d245a83a018450eb9c39cb45122509eeaacbc8a7f38bf0