Analysis
-
max time kernel
67s -
max time network
74s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/02/2024, 19:45
Static task
static1
Behavioral task
behavioral1
Sample
Tundra/ExploitDLL.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral2
Sample
Tundra/FastColoredTextBox.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Tundra/Tundra.exe
Resource
win10v2004-20231215-en
General
-
Target
Tundra/Tundra.exe
-
Size
377KB
-
MD5
7cbc5915698f95ffdec2122fb8eda7d7
-
SHA1
237c7cd54302c0a1083fd7114572b6f6ec67883e
-
SHA256
943c28f6cb1d7cb2020fb246aaebd5760c159bb455dc944adedc52aa2125f5d0
-
SHA512
a077f6bca84e27112287dfdb4f98e8c8ebfd3633bf4cf9f1f5e30f630e7614435a4627e9d2bc6d864f3c8bd1002390065b2b7dbcbdfaf15276fa5be68a9ecaf7
-
SSDEEP
6144:DYac7RzReNzny1BH2faX7RzReNzny1BH2:3qR99TrR99
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 63 discord.com 64 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1815711207-1844170477-3539718864-1000\{7798E77B-80A4-4BF6-8666-2CFF7E291F6D} msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2980 Tundra.exe 2980 Tundra.exe 3008 msedge.exe 3008 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 2412 msedge.exe 2412 msedge.exe 1148 identity_helper.exe 1148 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 18 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2848 wmic.exe Token: SeSecurityPrivilege 2848 wmic.exe Token: SeTakeOwnershipPrivilege 2848 wmic.exe Token: SeLoadDriverPrivilege 2848 wmic.exe Token: SeSystemProfilePrivilege 2848 wmic.exe Token: SeSystemtimePrivilege 2848 wmic.exe Token: SeProfSingleProcessPrivilege 2848 wmic.exe Token: SeIncBasePriorityPrivilege 2848 wmic.exe Token: SeCreatePagefilePrivilege 2848 wmic.exe Token: SeBackupPrivilege 2848 wmic.exe Token: SeRestorePrivilege 2848 wmic.exe Token: SeShutdownPrivilege 2848 wmic.exe Token: SeDebugPrivilege 2848 wmic.exe Token: SeSystemEnvironmentPrivilege 2848 wmic.exe Token: SeRemoteShutdownPrivilege 2848 wmic.exe Token: SeUndockPrivilege 2848 wmic.exe Token: SeManageVolumePrivilege 2848 wmic.exe Token: 33 2848 wmic.exe Token: 34 2848 wmic.exe Token: 35 2848 wmic.exe Token: 36 2848 wmic.exe Token: SeIncreaseQuotaPrivilege 2848 wmic.exe Token: SeSecurityPrivilege 2848 wmic.exe Token: SeTakeOwnershipPrivilege 2848 wmic.exe Token: SeLoadDriverPrivilege 2848 wmic.exe Token: SeSystemProfilePrivilege 2848 wmic.exe Token: SeSystemtimePrivilege 2848 wmic.exe Token: SeProfSingleProcessPrivilege 2848 wmic.exe Token: SeIncBasePriorityPrivilege 2848 wmic.exe Token: SeCreatePagefilePrivilege 2848 wmic.exe Token: SeBackupPrivilege 2848 wmic.exe Token: SeRestorePrivilege 2848 wmic.exe Token: SeShutdownPrivilege 2848 wmic.exe Token: SeDebugPrivilege 2848 wmic.exe Token: SeSystemEnvironmentPrivilege 2848 wmic.exe Token: SeRemoteShutdownPrivilege 2848 wmic.exe Token: SeUndockPrivilege 2848 wmic.exe Token: SeManageVolumePrivilege 2848 wmic.exe Token: 33 2848 wmic.exe Token: 34 2848 wmic.exe Token: 35 2848 wmic.exe Token: 36 2848 wmic.exe Token: SeDebugPrivilege 2980 Tundra.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2848 2980 Tundra.exe 84 PID 2980 wrote to memory of 2848 2980 Tundra.exe 84 PID 2980 wrote to memory of 4580 2980 Tundra.exe 95 PID 2980 wrote to memory of 4580 2980 Tundra.exe 95 PID 4580 wrote to memory of 4060 4580 msedge.exe 96 PID 4580 wrote to memory of 4060 4580 msedge.exe 96 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3248 4580 msedge.exe 97 PID 4580 wrote to memory of 3008 4580 msedge.exe 98 PID 4580 wrote to memory of 3008 4580 msedge.exe 98 PID 4580 wrote to memory of 3476 4580 msedge.exe 99 PID 4580 wrote to memory of 3476 4580 msedge.exe 99 PID 4580 wrote to memory of 3476 4580 msedge.exe 99 PID 4580 wrote to memory of 3476 4580 msedge.exe 99 PID 4580 wrote to memory of 3476 4580 msedge.exe 99 PID 4580 wrote to memory of 3476 4580 msedge.exe 99 PID 4580 wrote to memory of 3476 4580 msedge.exe 99 PID 4580 wrote to memory of 3476 4580 msedge.exe 99 PID 4580 wrote to memory of 3476 4580 msedge.exe 99 PID 4580 wrote to memory of 3476 4580 msedge.exe 99 PID 4580 wrote to memory of 3476 4580 msedge.exe 99 PID 4580 wrote to memory of 3476 4580 msedge.exe 99 PID 4580 wrote to memory of 3476 4580 msedge.exe 99 PID 4580 wrote to memory of 3476 4580 msedge.exe 99 PID 4580 wrote to memory of 3476 4580 msedge.exe 99 PID 4580 wrote to memory of 3476 4580 msedge.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\Tundra\Tundra.exe"C:\Users\Admin\AppData\Local\Temp\Tundra\Tundra.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/q7N9ypmTWG2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff83ff46f8,0x7fff83ff4708,0x7fff83ff47183⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,15214638541994012,8406184186428942458,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:23⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,15214638541994012,8406184186428942458,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,15214638541994012,8406184186428942458,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:83⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15214638541994012,8406184186428942458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:13⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15214638541994012,8406184186428942458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:13⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15214638541994012,8406184186428942458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4504 /prefetch:13⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2212,15214638541994012,8406184186428942458,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5556 /prefetch:83⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2212,15214638541994012,8406184186428942458,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5568 /prefetch:83⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,15214638541994012,8406184186428942458,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5936 /prefetch:83⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,15214638541994012,8406184186428942458,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5936 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15214638541994012,8406184186428942458,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4356 /prefetch:13⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15214638541994012,8406184186428942458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:13⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15214638541994012,8406184186428942458,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:13⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15214638541994012,8406184186428942458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:13⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15214638541994012,8406184186428942458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6480 /prefetch:13⤵PID:788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15214638541994012,8406184186428942458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6244 /prefetch:13⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15214638541994012,8406184186428942458,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6240 /prefetch:13⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15214638541994012,8406184186428942458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:13⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15214638541994012,8406184186428942458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7108 /prefetch:13⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15214638541994012,8406184186428942458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6868 /prefetch:13⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15214638541994012,8406184186428942458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6852 /prefetch:13⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15214638541994012,8406184186428942458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6732 /prefetch:13⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15214638541994012,8406184186428942458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6512 /prefetch:13⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15214638541994012,8406184186428942458,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:13⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15214638541994012,8406184186428942458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3516 /prefetch:13⤵PID:1880
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1312
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d5564ccbd62bac229941d2812fc4bfba
SHA10483f8496225a0f2ca0d2151fab40e8f4f61ab6d
SHA256d259ff04090cbde3b87a54554d6e2b8a33ba81e9483acbbe3e6bad15cbde4921
SHA512300cda7933e8af577bdc1b20e6d4279d1e418cdb0571c928b1568bfea3c231ba632ccb67313ae73ddeae5586d85db95caffaedd23e973d437f8496a8c5a15025
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5df2ae8da4e8a43cdcd1e431f7c77ca14
SHA157bd7cdfef7219e52d9066f1f4fb173c0909c47a
SHA25687916e5295af6bddb41fedb7692d1e173a32435444c578ac88c2a0d1aa2db933
SHA51237d9340f9bef63957d775cc451bdf7bf01f05b1b3afbf7a5c0ec179fff267f19a922f3ef2ddff48a89f7a3324acc109edb073b93a921931d725b4ae7e315c565
-
Filesize
537B
MD5aa1af4e0ce39169a30e810a46308239c
SHA1dfdc83879b93fbe39ecb4f587bb9808bf9a453c8
SHA256b8cd4962eb99709ba16c6487b815ed04012e126bd00c05c058d26b19c5b87b5c
SHA5121fba71d802f01f8ab7d7d12cecdc286a667313ef3c3d6253d26f949be7ab2d174115310e9ea4679553ab391a834be94b5ad61c0270b86b62c4bc6a12930238b7
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD583e6347c63b31db2550783b001d25803
SHA1fe252b4aabbb9527ec75e0984f81a5bc3286d935
SHA25669c1c3f6db53d65c8b61ccc894bb57282dd2ccd5f3e0737cfc660416225c17d9
SHA512f5890c84b26ccb0099627eb8399ee5112e5c6b6c4ab2a970bb2aad58b049217bb8f2cb004bb14c0df0a3ea4885fde6131af6b02b2061e63382431332c52c7c75
-
Filesize
5KB
MD5e7b95cb60d95c7ab8d2e2440fd87902b
SHA139d80b920a8f5b6d7c580aa6107069fa42bd6e62
SHA2561c9c51e41ab35ad950a56588a9718c48e67fd501b8b4655b7636de18f71faaf3
SHA512616730a7b67879d25fa8ef6d2b58909c993a709e5c37edd93005ea65e0e7d97d97f8213f122974a1bc922f3d29990298ba63fef4813c9e5de4ca8fc56f4a3c80
-
Filesize
5KB
MD59c82fd84fa39e50ce7a05a18c9edfcf1
SHA111266aebc017b4d7e065d3dd36ef3de86f05a258
SHA256e09623b3cc701afdbeefdb8070b4eec4ed308f6a6dd7adb527c84f58942ec01b
SHA512a3dc140bf3d82bf09a049b0f6b717d0f5c2a594926c6e57e51c6a18de1c6e50a5ea9d5acfa4bcd72d551736ecf583b46f316ba4297282e32e5b495299a97a6c5
-
Filesize
6KB
MD53b3f9ceffa10c9869caa6e7e559fe8b8
SHA1f96da1a14704acac038fff83086cbe69a19a8b8f
SHA256c4846dde845dff7b701dba11cbb811e24220706d4d73264af8ae98f5e7c6bbcf
SHA512d765e43c04af74aef59ae5858eb94d269c0bc2400ff2fe653bcefc7255ba5812de144fcb5fbd698b73abad650b800b4c11ad97e8a5f68b8f3c0938115f206f7f
-
Filesize
24KB
MD51d1c7c7f0b54eb8ba4177f9e91af9dce
SHA12b0f0ceb9a374fec8258679c2a039fbce4aff396
SHA256555c13933eae4e0b0e992713ed8118e2980442f89fbdfb06d3914b607edbbb18
SHA5124c8930fe2c805c54c0076408aba3fbfb08c24566fba9f6a409b5b1308d39c7b26c96717d43223632f1f71d2e9e68a01b43a60031be8f1ca7a541fe0f56f4d9f2
-
Filesize
370B
MD5cc983c74a180c270972e7f6330c9792a
SHA1a68c2d94baced85dd5f57a8660337ed2c722d756
SHA25625d507fe46fad4293427c9941642957465e9c88fed2956e9af42eec6f70507c4
SHA5120f6d66d1afc967459064a5343c2eac04f7130e5236a99be73d9ebb5598b266354eaf7c87e45b649dd685b4a782e9f69f8e0f54697f5ca1cccdb2b58575bb1ce6
-
Filesize
370B
MD506d5a40b761333d7f0451be0d2bd3ee8
SHA128a9cd9514b84c65ebdda4a0e74d0b0caea7e9c2
SHA2564d93ed721d0e1c885b7eac81c7c0a77740972e59f29fda4873573d7269808ce2
SHA5129d2a08ae6dd8635400ddeee4d045c2ff9f90ed27aae9fbbd72f438da6725862a4f50216f4c81e11ecc338b7e26f4a9e79e2933210d037b01e6c135e3c2354f7c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53d013e47cf9cbc66162ff051bad3d9f3
SHA1eb3910df8695ac38b499a1e17badc45664a3814e
SHA2562dd02ba1a24c7584ad3a443f485809f7ac2e9c4006178364adcdad057cc08dab
SHA512e553f5a818fa30f5909132fa5c426e1cd58380971ef56578245dd05d223d1af61b14ce425c2e794679722083f1a55075ef4db6fa3114c2e5f0772224a6b061c3
-
Filesize
10KB
MD53ad97bb1657cb973823583a4cb857edc
SHA1dc6a5c495e36ebec7630cd7bfc5b57451a855269
SHA25685b58c8ef912e5287d74788dfdb7999e928cc282402fb4c62a4b36483b283e5f
SHA512f1fea2c76bcd9520e2db40358330fc655f1b0517519501225025efb22c67834236f5f67ef416490d6d921a48f5f248295a5c91a50f5668caf6845c3332ceecd4
-
Filesize
10KB
MD59348febbf73889a8b6b22d7e1ec24774
SHA1dfb642c3c53003683ac32c2f334ef30e61025e59
SHA256535810182309952b1d5269392788d2d0f6c553117888278e538cddf3ebcaf559
SHA51297706a7852066c7dee1f93890fdf2c0debd0de94cfd0e91a6bb5e8783a9db7ae3400a9f1607fc211c2ce1be06356530f33f03d2e195392b9d291e56688f8875a