Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2024 13:34
Static task
static1
Behavioral task
behavioral1
Sample
42.zip
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
42.zip
Resource
win10v2004-20231215-en
General
-
Target
42.zip
-
Size
41KB
-
MD5
1df9a18b18332f153918030b7b516615
-
SHA1
6c42c62696616b72bbfc88a4be4ead57aa7bc503
-
SHA256
bbd05de19aa2af1455c0494639215898a15286d9b05073b6c4817fe24b2c36fa
-
SHA512
6382ca9c307d66ab7566acf78b1afd44b18b24d766253e1dc1cb3a3c0be96ecf1f2042d6bd3332d49078ffee571cf98869c1284c1d3e5c1c7dc3e4c64f71af80
-
SSDEEP
768:hzyVr8GSKL6O3QOXk/0u3wqOghrFCezL1VFJdbq2QTJTw02Q:hGx8DKXE//ZhhCirFi2cwK
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 162 raw.githubusercontent.com 161 raw.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-768304381-2824894965-3840216961-1000\{1C324AE4-4E51-47EB-BEEC-A4790F3E8CB3} msedge.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 848 msedge.exe 848 msedge.exe 3908 msedge.exe 3908 msedge.exe 3004 identity_helper.exe 3004 identity_helper.exe 1336 msedge.exe 1336 msedge.exe 4992 msedge.exe 4992 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
pid Process 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 2640 7zG.exe Token: 35 2640 7zG.exe Token: SeSecurityPrivilege 2640 7zG.exe Token: SeSecurityPrivilege 2640 7zG.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 2640 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3908 wrote to memory of 3872 3908 msedge.exe 97 PID 3908 wrote to memory of 3872 3908 msedge.exe 97 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 4188 3908 msedge.exe 98 PID 3908 wrote to memory of 848 3908 msedge.exe 99 PID 3908 wrote to memory of 848 3908 msedge.exe 99 PID 3908 wrote to memory of 2236 3908 msedge.exe 100 PID 3908 wrote to memory of 2236 3908 msedge.exe 100 PID 3908 wrote to memory of 2236 3908 msedge.exe 100 PID 3908 wrote to memory of 2236 3908 msedge.exe 100 PID 3908 wrote to memory of 2236 3908 msedge.exe 100 PID 3908 wrote to memory of 2236 3908 msedge.exe 100 PID 3908 wrote to memory of 2236 3908 msedge.exe 100 PID 3908 wrote to memory of 2236 3908 msedge.exe 100 PID 3908 wrote to memory of 2236 3908 msedge.exe 100 PID 3908 wrote to memory of 2236 3908 msedge.exe 100 PID 3908 wrote to memory of 2236 3908 msedge.exe 100 PID 3908 wrote to memory of 2236 3908 msedge.exe 100 PID 3908 wrote to memory of 2236 3908 msedge.exe 100 PID 3908 wrote to memory of 2236 3908 msedge.exe 100 PID 3908 wrote to memory of 2236 3908 msedge.exe 100 PID 3908 wrote to memory of 2236 3908 msedge.exe 100 PID 3908 wrote to memory of 2236 3908 msedge.exe 100 PID 3908 wrote to memory of 2236 3908 msedge.exe 100 PID 3908 wrote to memory of 2236 3908 msedge.exe 100 PID 3908 wrote to memory of 2236 3908 msedge.exe 100
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\42.zip1⤵PID:3648
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3144
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffecbde46f8,0x7ffecbde4708,0x7ffecbde47182⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,16015508911878588985,17181791425313661807,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,16015508911878588985,17181791425313661807,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,16015508911878588985,17181791425313661807,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16015508911878588985,17181791425313661807,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16015508911878588985,17181791425313661807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16015508911878588985,17181791425313661807,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3584 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,16015508911878588985,17181791425313661807,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4108 /prefetch:82⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,16015508911878588985,17181791425313661807,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4108 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16015508911878588985,17181791425313661807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16015508911878588985,17181791425313661807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16015508911878588985,17181791425313661807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2144,16015508911878588985,17181791425313661807,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5716 /prefetch:82⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16015508911878588985,17181791425313661807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16015508911878588985,17181791425313661807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2144,16015508911878588985,17181791425313661807,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5088 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2144,16015508911878588985,17181791425313661807,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5520 /prefetch:82⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16015508911878588985,17181791425313661807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16015508911878588985,17181791425313661807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16015508911878588985,17181791425313661807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16015508911878588985,17181791425313661807,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16015508911878588985,17181791425313661807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16015508911878588985,17181791425313661807,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16015508911878588985,17181791425313661807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16015508911878588985,17181791425313661807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6224 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2144,16015508911878588985,17181791425313661807,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6032 /prefetch:82⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2144,16015508911878588985,17181791425313661807,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5992 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,16015508911878588985,17181791425313661807,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4944 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3776
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1044
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1440
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\42\" -ad -an -ai#7zMap6550:66:7zEvent143651⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD55e77545b7e1c504b2f5ce7c5cc2ce1fe
SHA1d81a6af13cf31fa410b85471e4509124ebeaff7e
SHA256cbb617cd6cde793f367df016b200d35ce3c521ab901bbcb52928576bb180bc11
SHA512cbc65c61334a8b18ece79acdb30a4af80aa9448c3edc3902b00eb48fd5038bf6013d1f3f6436c1bcb637e78c485ae8e352839ca3c9ddf7e45b3b82d23b0e6e37
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize6KB
MD52594dccb8434cee0b8a7b2c86be703a1
SHA184c61f74d9a996f5efd43ffc970f7c58e4cd330f
SHA25668d68acd35129eddbc67e83b47b613a2ee5fc3d82a301b51a1cb6503c675fe4e
SHA5126a3c821dc7361a2bab93d1ad087cf1123e9f0646acbf05b160fd0dd3872da36d52c42faa1bfeb61b5c5295c22e39429481ef9aaeb627fb8d99fd2cc11181c6ca
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
1KB
MD59a5a3930da146514dce790390be8661d
SHA188fdb96d5711386e25e8cd9fbd052cc5cdb8c0c5
SHA25620be8b98f6741bc6be71570f7bc5f50bd9f3a3e97e84d66e2a6c0fcc8a49973d
SHA51238acfff29253725aca69f1e27c1957560b7c0d2c48c6e96dd59e1a5f699cf9e19890d6fba3f39f7b4c15d246bc08f872d7d74959135c9d1cec1832cd3a09bbe0
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
7KB
MD56f675c072488ff181f238ff5d09aebf9
SHA10df44794af7aabed3d01947120f3961e229cde7b
SHA256c50d6ee327fb62dc167306d4ac0d0ac0c203e8a7a89083bd7b405b62d77f4625
SHA5127d130181b8cdd58880d4f3ecca04e9e137ff6c728eec81c35c3eb501ee2931797f996fcf1119f0dc4bc26625032fb2641289643599a4e51bd9d834dad08cd9aa
-
Filesize
6KB
MD50a2ee069c8d8936af28426ab6ca2c182
SHA1cff3314ea353314e54bdf53916b582cff39aa4a6
SHA256f3fe224408e8ae133f7dba49caf5a804b6ea55b10a3643b15d23551c5cae46c9
SHA512318f3df325138010f6a92803c304996929814ba4ace3cd2ee7ac2e9b235fffd0760d0ee713100d76799e22d19d21b2b9695ce39cb9ac7b74d7f510a4d7b244c0
-
Filesize
5KB
MD568549ac56e595ff4f63831dc219a1430
SHA1140ae68a8d1573835b066a7425f16fb9b2632a60
SHA256c3cf339c3588d4a0ae4aff348d913f6f8f90de94640fd9c54aa3430248a845d0
SHA5128b0e2f9a71f43f8d755e47ec6ede155096d09ed376d1983b234b3ef4f09cb47bcac64de7104f22c34337b74b23e016459cdee75d84f6ec4d252837fa3a2ab795
-
Filesize
5KB
MD58e4bc633f6ddb76100ab8c6704ad2da1
SHA1b6745cdb554b5cdb44ea15194856744a7835fab9
SHA25626f5e105dcb5ff2fe5afdb5ab80a661b186f799ef3d20e436387c49e9d09f170
SHA5124dbf89e382ea401c68c4995e41bf74aef8ba72c4a8adf573f8c45834bc05e76b12d5142242848bb8ed319d6103bb596ec56bd5d6b221e86e56659cc0452d38a5
-
Filesize
6KB
MD5a63494e2fc25f15146f1e0385bf6472e
SHA11ee0030f5b5e569a14ca87d2e7eaba237b135f4e
SHA2563125b45c128f3c296e53c62150fa1ef44bd356fae4b9ecdd27e525ba28dc4c32
SHA512838c07dbb02a07b2cf072f42a87123ee02e6bbcd742844877cbbaf95faed8c668744165adcf6b4672cf5eeee40c46b5a0406356e1575b47218d461bb29e0bfe5
-
Filesize
24KB
MD56db2d2ceb22a030bd1caa72b32cfbf98
SHA1fe50f35e60f88624a28b93b8a76be1377957618b
SHA2567b22b0b16088ab7f7d6f938d7cfe9ae807856662ce3a63e7de6c8107186853e4
SHA512d5a67a394003f559c98e1a1e9e31c2d473d04cc075b08bb0aab115ce42744da536895df2cec73fa54fc36f38d38e4906680cfacfbf4698ee925f1609fbb07912
-
Filesize
2KB
MD54ba45d6e0e252667e8b7b78604a3e158
SHA1283aad46383ba176c8ce8e75373917f669db527b
SHA256a10126217f208a9f768af4ee92c13c52cd44ab927dc23b1a1569afdddfdc6a90
SHA512f224c7f7e7246738e7899ab7fa3cf31fe73401f9e01a18ecafb84ee5fc40a3c701cb92812b7fb9531ccb27dc638989cec53d848abc512df85e3bad6b81fb9b41
-
Filesize
2KB
MD515ed8125210c7f12aed5d0c4a371b8f1
SHA179eb6af466600b57104dc4a177c6ff90cf54320e
SHA256f3bd82ff5819b9b291a3b6e9f75632d5179b772a1719af9c6375b5bd34747cb8
SHA5121dae76219b15a21a8c9fe002dd44c0c63d90884c082cc8b9f9c89431d6bdc329a1b43b5bb9609cb37f690731619e34b79dfd50a7955bb2d6f640a684cdb1a361
-
Filesize
2KB
MD5f5512c0f6159f87ac58ba23cf8bc5112
SHA120a3dd88c0e0ebfa74ab335506b04abce0cdb0bf
SHA2562a0958425be6d386fb9211e0fc10fa561dd617eae81fa8be13aeb1ad6e8609ec
SHA512c8fc0053509de48bfbdde56b1315f8c95c85df503c354629c0698de94e91df9546e0ed496c211972161211521af60009a1149b7612599646064d7d897c265f46
-
Filesize
1KB
MD506cd2abfaa4601f1a607e04b6a79fe16
SHA1e38d2fe243485f1329cd44f5c428f8ea590f14e7
SHA256ecbc71a50a4ad07c04e96fc6648d679f135c19da1c6166698c538899b5a66a17
SHA512b530e162931ee4c49905a06767facacb644d9727c615259f1445dd2ca4fade42831b24b87bf34cb665cda126b82be36a8fa6fdcf8e6a415b8891d734c2486fb9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50cd1c3b361568dba7f1d533bf9e2d7b2
SHA1a876bfa4b64a5523fd6229c3d927b882b1aa40d2
SHA25608862612cfc4f929011b0e9801c021e09bc99c74a0eb3a5ed291a5069b4db4dd
SHA512a6023e574138039845eb4af0373b12a4c10b18a9359d15a7ab7967b48d079be59bb4f24f901710f1231d91a72d0deb515de1c0d57f278cd0ae97a881a94eb2c6
-
Filesize
10KB
MD52bcae7732d17e85a52f8e0fb4a632cbe
SHA1c3549b816faf895f077ace2d023983be70d3fb4c
SHA25624530cf492724926ec28542591dfb24ef58888c9ebce48aaf6ec158b9bb84fe6
SHA512e9d423faed156ac84527e08b07af8da76325d4f2d767fa6e58e10b3fe8737a6cf9a2b1399f66b72f5073370df371cc1ec0777e1109b39bd93f9914e47ca20ad6
-
Filesize
12KB
MD57b9c73ad14b566e3d26472aa4e6bae90
SHA1b090489be94b894b593dd84b7e46f4c7958910c1
SHA256faa03c5a7ddf9e73c6a6eb1601a3aa267bedb3d212a145a353ec358642d98cda
SHA512c0b97519570aad2ade0829dcfe1732e65b9c7c601bf72a36438373d1cae5c94411e47a49adc0e4a14ffacdedbd525fb29918f4f1b0ab93a2ae6b4a33629f30ac
-
Filesize
41KB
MD51df9a18b18332f153918030b7b516615
SHA16c42c62696616b72bbfc88a4be4ead57aa7bc503
SHA256bbd05de19aa2af1455c0494639215898a15286d9b05073b6c4817fe24b2c36fa
SHA5126382ca9c307d66ab7566acf78b1afd44b18b24d766253e1dc1cb3a3c0be96ecf1f2042d6bd3332d49078ffee571cf98869c1284c1d3e5c1c7dc3e4c64f71af80
-
Filesize
34KB
MD50a76bd3e26768bba68aca3d210997069
SHA1753690994a18cf58ed0fe3749d16448b763047b8
SHA2569056b87f079861d1b0f041317d6415927d9ffb6498ce2530ff90fda69fa64e78
SHA51214408ea7f44bc365a58d7480fff9ea3b10fa21bfbd3363c6e30b74a4d4121677e20ce1108cce12c203f0760768aee1c1aa69b130e090c409f9a516ea02d70c49