Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
779s -
max time network
725s -
platform
windows11-21h2_x64 -
resource
win11-20231222-en -
resource tags
arch:x64arch:x86image:win11-20231222-enlocale:en-usos:windows11-21h2-x64system -
submitted
13/02/2024, 16:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ebanksent.spdb.com.cn/msent-web-login/proLogin.do?_locale=en_US
Resource
win11-20231222-en
General
-
Target
https://ebanksent.spdb.com.cn/msent-web-login/proLogin.do?_locale=en_US
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133523165377547846" chrome.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1984 chrome.exe 1984 chrome.exe 4420 msedge.exe 4420 msedge.exe 2812 msedge.exe 2812 msedge.exe 4536 msedge.exe 4536 msedge.exe 4352 identity_helper.exe 4352 identity_helper.exe 3768 chrome.exe 3768 chrome.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 22 IoCs
pid Process 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 1984 chrome.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 1984 chrome.exe 2812 msedge.exe 2812 msedge.exe 1984 chrome.exe 2812 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
pid Process 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1984 wrote to memory of 772 1984 chrome.exe 77 PID 1984 wrote to memory of 772 1984 chrome.exe 77 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 3784 1984 chrome.exe 79 PID 1984 wrote to memory of 456 1984 chrome.exe 81 PID 1984 wrote to memory of 456 1984 chrome.exe 81 PID 1984 wrote to memory of 2628 1984 chrome.exe 80 PID 1984 wrote to memory of 2628 1984 chrome.exe 80 PID 1984 wrote to memory of 2628 1984 chrome.exe 80 PID 1984 wrote to memory of 2628 1984 chrome.exe 80 PID 1984 wrote to memory of 2628 1984 chrome.exe 80 PID 1984 wrote to memory of 2628 1984 chrome.exe 80 PID 1984 wrote to memory of 2628 1984 chrome.exe 80 PID 1984 wrote to memory of 2628 1984 chrome.exe 80 PID 1984 wrote to memory of 2628 1984 chrome.exe 80 PID 1984 wrote to memory of 2628 1984 chrome.exe 80 PID 1984 wrote to memory of 2628 1984 chrome.exe 80 PID 1984 wrote to memory of 2628 1984 chrome.exe 80 PID 1984 wrote to memory of 2628 1984 chrome.exe 80 PID 1984 wrote to memory of 2628 1984 chrome.exe 80 PID 1984 wrote to memory of 2628 1984 chrome.exe 80 PID 1984 wrote to memory of 2628 1984 chrome.exe 80 PID 1984 wrote to memory of 2628 1984 chrome.exe 80 PID 1984 wrote to memory of 2628 1984 chrome.exe 80 PID 1984 wrote to memory of 2628 1984 chrome.exe 80 PID 1984 wrote to memory of 2628 1984 chrome.exe 80 PID 1984 wrote to memory of 2628 1984 chrome.exe 80 PID 1984 wrote to memory of 2628 1984 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ebanksent.spdb.com.cn/msent-web-login/proLogin.do?_locale=en_US1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff0ccd9758,0x7fff0ccd9768,0x7fff0ccd97782⤵PID:772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1820,i,9877286404312675265,2519714600247376501,131072 /prefetch:22⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2168 --field-trial-handle=1820,i,9877286404312675265,2519714600247376501,131072 /prefetch:82⤵PID:2628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=1820,i,9877286404312675265,2519714600247376501,131072 /prefetch:82⤵PID:456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3040 --field-trial-handle=1820,i,9877286404312675265,2519714600247376501,131072 /prefetch:12⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3032 --field-trial-handle=1820,i,9877286404312675265,2519714600247376501,131072 /prefetch:12⤵PID:4832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 --field-trial-handle=1820,i,9877286404312675265,2519714600247376501,131072 /prefetch:82⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3944 --field-trial-handle=1820,i,9877286404312675265,2519714600247376501,131072 /prefetch:82⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5032 --field-trial-handle=1820,i,9877286404312675265,2519714600247376501,131072 /prefetch:12⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3208 --field-trial-handle=1820,i,9877286404312675265,2519714600247376501,131072 /prefetch:12⤵PID:2536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3732 --field-trial-handle=1820,i,9877286404312675265,2519714600247376501,131072 /prefetch:12⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3664 --field-trial-handle=1820,i,9877286404312675265,2519714600247376501,131072 /prefetch:12⤵PID:252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2816 --field-trial-handle=1820,i,9877286404312675265,2519714600247376501,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3080 --field-trial-handle=1820,i,9877286404312675265,2519714600247376501,131072 /prefetch:12⤵PID:4212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3960 --field-trial-handle=1820,i,9877286404312675265,2519714600247376501,131072 /prefetch:12⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2424
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff0be93cb8,0x7fff0be93cc8,0x7fff0be93cd82⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1944,4241320769119041234,5169078790387408482,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1944,4241320769119041234,5169078790387408482,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1960 /prefetch:22⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1944,4241320769119041234,5169078790387408482,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2552 /prefetch:82⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,4241320769119041234,5169078790387408482,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,4241320769119041234,5169078790387408482,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,4241320769119041234,5169078790387408482,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,4241320769119041234,5169078790387408482,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1944,4241320769119041234,5169078790387408482,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3760 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1944,4241320769119041234,5169078790387408482,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,4241320769119041234,5169078790387408482,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4524 /prefetch:12⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,4241320769119041234,5169078790387408482,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4608 /prefetch:12⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,4241320769119041234,5169078790387408482,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,4241320769119041234,5169078790387408482,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1948 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,4241320769119041234,5169078790387408482,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,4241320769119041234,5169078790387408482,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,4241320769119041234,5169078790387408482,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3764 /prefetch:12⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,4241320769119041234,5169078790387408482,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1944,4241320769119041234,5169078790387408482,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1344 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,4241320769119041234,5169078790387408482,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,4241320769119041234,5169078790387408482,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:3612
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3044
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
824B
MD5a44aa64cb5c62b13a85a9b50c1eb7537
SHA1533b4fb7a14a7be36256898a3c0f745eca5be597
SHA256e04e83916481fabf499481b7652c70ef231c98a7c26944ac28a06a148550ad86
SHA512f1ab14f293e6ee483aea71021598205fc97e00f89bdfd7da3cc29d6b0a66975f7fc4342ee4d2f4a4c6c25600cdec931d4991357282da982f5aa84f04f8e60a72
-
Filesize
6KB
MD52ef060a4c336c5fd75ae45909b98fe6c
SHA19a341148219740517c479c68ba1b5fd448abd133
SHA25661810fad69adb247e92f5f6a27d4163a8e736c5b69d907971893ea62787cfa20
SHA512d42e80d77e1ae1952bd94adaeeac8a917b76ce2d10c18327eb945584a75f2d90a3f1fd7e21f6781cb10f7a8f1a32efe4767ccf78453f12d08a7196ba76440791
-
Filesize
6KB
MD56a8d49e1d7e2ab560e73fca65251e322
SHA1078d1f5620205e58f249ecf68276ac5e8e95dc4c
SHA256edc800e13eaeb97ca8965be75e45a6eb1aae2c645f651ab0fe56d5264aebbbb4
SHA5120a0f3deef3ae3ff8f972978215f037db4c3f07c69b291d690135c2da1303da88b67b463f75d6176feaaf32fbe2c811e7fe020fc907da00b6b8a9d5e55e999cb1
-
Filesize
114KB
MD597238e35fea56fc6578795c945841532
SHA1c39172b57bd451f34455028918c8dcca438dd952
SHA2561335bd9b4415a095bde5567c9cff1b513a0a74df7f294af324629db1c7249aef
SHA512b3d2782e60bedd4014d3c5eff5ff0b944ca0a11c62f3e27ced010b3cdb8127b2417fea083c45abf5da1a07aca9e770f51a83c60b4376efa0bab6638504bfd7da
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
152B
MD56dbe72a1f5827efc08f70d06ef815d46
SHA16aacd61519fce53ecb92e5e61207a6c29c01f47b
SHA256dd673404dd6deb2d2b331316370fd05e47c01b9dc489640f05b50898d536a6e3
SHA5122e6115ca818df5f5b7985caf3ce2324e266b376f6180f84b44e9ae725e037a8456c2cd63e22b9750e2ba27f4c7460dfa429ce9910517a728b056e5f1e730e25a
-
Filesize
180B
MD500a455d9d155394bfb4b52258c97c5e5
SHA12761d0c955353e1982a588a3df78f2744cfaa9df
SHA25645a13c77403533b12fbeeeb580e1c32400ca17a32e15caa8c8e6a180ece27fed
SHA5129553f8553332afbb1b4d5229bbf58aed7a51571ab45cbf01852b36c437811befcbc86f80ec422f222963fa7dabb04b0c9ae72e9d4ff2eeb1e58cde894fbe234f
-
Filesize
4KB
MD576d906d847811df92c622028e8a26444
SHA139f79e7aacf2a8a9912552ce40f1eba692bc41f5
SHA256d27d3d36f7830af7999259c711b1980986dade86f737a904951a6b2a4aeef144
SHA512b2964518df1dbeb70231b8c15a1ff21760a1c0e69985a937ab9ee8251f99994c070f68ddd33e1d272ba6c1b3dc22a1d91d9efc14e814309e060ad8a7f9a00656
-
Filesize
5KB
MD50b04d6e0b68736480c87e182fb4e40c4
SHA12c360ad4fec16a7431e8806580efcd1d2034377f
SHA256186f1bb9470aac6b6ca25f748ecad3c4d78fb4764171069ff4657d725b81044d
SHA51231611012567eb1667f2d604709c8e80897e84538fb3d7c3d4f8fa5c5f8a938aef3e783c43ae38e28dfc3d8cbb640d14a3964c9fe5cd8880601926acf40bc7cc8
-
Filesize
5KB
MD5c181beb9115c967d658cb99d07bc868f
SHA126a3f3a65e7186efdf09b5d87d5ac31d15b602f2
SHA256f3757019d646703cf9b98f3e165f9215e55d469cd9362208eba746f88f2bcf69
SHA512a51bb59dc7a7e001650d0e1e2c968c185b33bdfc322695f7b5941ec338563cfcf5b150b6094b0ae8d521f00d4aa18db95f9836797f21fffe53183f01dad75295
-
Filesize
5KB
MD58181d365b02f150f5e3da358a6abb206
SHA16d39e93b1bf2ab7fe17390d3f6895df9f026a1d1
SHA25617d8936f3625229ebde4e20fb2eee9c17582d536f8c2d680664301dbc6bb73a8
SHA51285944ecd559afaf8d6e1b5d5d848aad83a483530035a43d6800bb4c0882fc94b0db765ff5edd3c68f0750dd485795a65b4efef4c20b86baa446987289c815428
-
Filesize
5KB
MD5a08212722a6dfee1e7c4898763054119
SHA1791d96c7a4913024740ec508d8b7057f60cd2667
SHA2563d77608789e685aeb74a4f02ab6590741a5f40ebf8b8c0c47050b538bdb96ccb
SHA512586376195be4201bc7cb0932bf3954b2f0e626e6b753e1ace2d0855fdd496295fb6e83c23fe32b966bea295ac41780ca9652834f82fa00518e9a19f421f1d888
-
Filesize
25KB
MD5e5477be1e6c4cc9f570c69a84dd4f681
SHA1fdcbdc83ccfef1c270b927c6815e641f6d96a132
SHA256f06ab204d1d24ecd2d13e473bf807a8fc65ed09114a227966b4a308bd7eaa531
SHA51224eb3338f0a7be6df183c5d5f22831bed07ce0779dcc124e805364a128a08f571160a6809556cd1de323c9d3cc64299855978967c8693b8324cd9bb22f5ffe14
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58ca50d0ceafe52f55a65d7ea1fe68ffb
SHA1d935cecb257a8850e9af8f94c1722a4fb501dc3c
SHA2568249ca081526e2514c9b069d768d854b70154c58457ab55d400abf00759cc567
SHA512540c55fa65edf53233112133d06b153f2cc49b3536bacedf14ec61c445a7716971424aea95ca874b9771ba2c4d142c915b70e4e1278e014c13d6b229620e82d6
-
Filesize
10KB
MD55050c77e0026814c6f46ad44ccf00711
SHA1a0d8f54acbb13d84988cc590bcc3b99b45a7a9a4
SHA256ef6175c78f132d2a3e2d29e73d92407eb7a1456dcb7595e2c496fe3052442e05
SHA512846f025c94bc730516eeaf4f1635976db043bdd65c26d2ca3e056cec667970b4be36e9b254ac56db05dddf1cda9cd6ab802389708deb725908ca01818e02f535