Analysis
-
max time kernel
59s -
max time network
60s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
22-02-2024 13:21
Static task
static1
Behavioral task
behavioral1
Sample
Arc_Spoofer.zip
Resource
win10v2004-20240221-en
Behavioral task
behavioral2
Sample
Arc_Spoofer.zip
Resource
win11-20240221-en
Behavioral task
behavioral3
Sample
Woofer/42.zip
Resource
win10v2004-20240221-en
Behavioral task
behavioral4
Sample
Woofer/42.zip
Resource
win11-20240221-en
Behavioral task
behavioral5
Sample
Woofer/README.md
Resource
win10v2004-20240221-en
Behavioral task
behavioral6
Sample
Woofer/README.md
Resource
win11-20240221-en
Errors
General
-
Target
Arc_Spoofer.zip
-
Size
41KB
-
MD5
036ec6c53db8f95b768ba73e52bc2ed5
-
SHA1
7fc76a30e6c4f95239f6f06d4731153f1e3e52ec
-
SHA256
0a54469a29336e4bb06f88e42dcbdb1294603689ae54ad1b18134041bb6470e2
-
SHA512
82ac70535165974828653ef74f334b7f40bb36414de37224476764891a78f255b626d3cfe6290483937651d667a4a851d0cb5808f1f52e9fd5342a4ee990b2b0
-
SSDEEP
768:/UMiHEhp2vCIODrhNGkAalt/bp2GiKlIPJV1Aoi+vZPJSFmGiU0Jv1uwib:/UKP2vCF1Aalt/keIPhDjZPJSFmLq
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\winnt32.exe" NoEscape.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NoEscape.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3316742141-2240921845-2885234760-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" NoEscape.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Desktop\desktop.ini NoEscape.exe File opened for modification C:\Users\Public\Desktop\desktop.ini NoEscape.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3316742141-2240921845-2885234760-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\noescape.png" NoEscape.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\winnt32.exe NoEscape.exe File opened for modification C:\Windows\winnt32.exe NoEscape.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "50" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3316742141-2240921845-2885234760-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3316742141-2240921845-2885234760-1000\{77E4FEAE-C6EB-4C1B-A063-6A65C12785D3} msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4940 msedge.exe 4940 msedge.exe 3512 msedge.exe 3512 msedge.exe 2508 identity_helper.exe 2508 identity_helper.exe 1436 msedge.exe 1436 msedge.exe 3268 msedge.exe 3268 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5604 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3512 wrote to memory of 2384 3512 msedge.exe 95 PID 3512 wrote to memory of 2384 3512 msedge.exe 95 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 2140 3512 msedge.exe 97 PID 3512 wrote to memory of 4940 3512 msedge.exe 96 PID 3512 wrote to memory of 4940 3512 msedge.exe 96 PID 3512 wrote to memory of 1576 3512 msedge.exe 98 PID 3512 wrote to memory of 1576 3512 msedge.exe 98 PID 3512 wrote to memory of 1576 3512 msedge.exe 98 PID 3512 wrote to memory of 1576 3512 msedge.exe 98 PID 3512 wrote to memory of 1576 3512 msedge.exe 98 PID 3512 wrote to memory of 1576 3512 msedge.exe 98 PID 3512 wrote to memory of 1576 3512 msedge.exe 98 PID 3512 wrote to memory of 1576 3512 msedge.exe 98 PID 3512 wrote to memory of 1576 3512 msedge.exe 98 PID 3512 wrote to memory of 1576 3512 msedge.exe 98 PID 3512 wrote to memory of 1576 3512 msedge.exe 98 PID 3512 wrote to memory of 1576 3512 msedge.exe 98 PID 3512 wrote to memory of 1576 3512 msedge.exe 98 PID 3512 wrote to memory of 1576 3512 msedge.exe 98 PID 3512 wrote to memory of 1576 3512 msedge.exe 98 PID 3512 wrote to memory of 1576 3512 msedge.exe 98 PID 3512 wrote to memory of 1576 3512 msedge.exe 98 PID 3512 wrote to memory of 1576 3512 msedge.exe 98 PID 3512 wrote to memory of 1576 3512 msedge.exe 98 PID 3512 wrote to memory of 1576 3512 msedge.exe 98
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Arc_Spoofer.zip1⤵PID:2024
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb5ba946f8,0x7ffb5ba94708,0x7ffb5ba947182⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,15982023017849506282,8730672947865101676,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,15982023017849506282,8730672947865101676,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,15982023017849506282,8730672947865101676,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15982023017849506282,8730672947865101676,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15982023017849506282,8730672947865101676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15982023017849506282,8730672947865101676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15982023017849506282,8730672947865101676,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,15982023017849506282,8730672947865101676,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3588 /prefetch:82⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,15982023017849506282,8730672947865101676,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3588 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15982023017849506282,8730672947865101676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3592 /prefetch:12⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15982023017849506282,8730672947865101676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15982023017849506282,8730672947865101676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15982023017849506282,8730672947865101676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15982023017849506282,8730672947865101676,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:12⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15982023017849506282,8730672947865101676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2648 /prefetch:12⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2128,15982023017849506282,8730672947865101676,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5872 /prefetch:82⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2128,15982023017849506282,8730672947865101676,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3488 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15982023017849506282,8730672947865101676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15982023017849506282,8730672947865101676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15982023017849506282,8730672947865101676,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3640 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15982023017849506282,8730672947865101676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:12⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2128,15982023017849506282,8730672947865101676,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5896 /prefetch:82⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2128,15982023017849506282,8730672947865101676,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6320 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3268
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1452
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\Temp1_NoEscape.exe.zip\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_NoEscape.exe.zip\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Disables RegEdit via registry modification
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Drops file in Windows directory
PID:2024
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa396c055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:5604
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51af9fbc1d4655baf2df9e8948103d616
SHA1c58d5c208d0d5aab5b6979b64102b0086799b0bf
SHA256e83daa7b2af963dbb884d82919710164e2337f0f9f5e5c56ee4b7129d160c135
SHA512714d0ff527a8a24ec5d32a0a2b74e402ee933ea86e42d3e2fb5615c8345e6c09aa1c2ddf2dea53d71c5a666483a3b494b894326fea0cc1d8a06d3b32ec9397d3
-
Filesize
152B
MD5aa6f46176fbc19ccf3e361dc1135ece0
SHA1cb1f8c693b88331e9513b77efe47be9e43c43b12
SHA2562f5ba493c7c4192e9310cea3a96cfec4fd14c6285af6e3659627ab177e560819
SHA5125d26fdffebeb1eb5adde9f7da19fe7069e364d3f68670013cb0cc3e2b40bf1fbcb9bdebbfe999747caf141c88ccd53bd4acf2074283e4bde46b8c28fbae296f5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5bb430d2d030ca16a99c65ba9318db78b
SHA115d5d8ca073c3872f18f22e5a106efca7c17e107
SHA2566dbaf124ca2113d89a674d0aba64ce3a5880396caf18b1bd46c22af1d0821add
SHA512148b0e67f6ddc650132d491052799bf9cb57b5e571922640fa5659f470388f2d81a7e99e7cf4039f63ac0af353c865ef066d0d91c5aeb982589b5328e1bcdb4b
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD52fc8c6677d3ea6180265fe1bf2f9725c
SHA1c2eab25c21536270231e80d706266f630b4fd22f
SHA2563cd35a86735e72c3013dbcd0bb5cc406d9f59651f929cafac84c8f1c94f696d5
SHA512acf509f80ef27165e64709a95d87c492907fa55336c38a5bd6e8c210a1fba00f8cc17eb0f34617a4f952e6337a0d979a4f108973d81eb53931575ec7f196d6b5
-
Filesize
7KB
MD5ba33df15c327b913bdf60afad6fe53ee
SHA1e92dc481c54ef8f80cca5d0d0d8e18905bc7cf05
SHA256bd60cea142a46ea246e722a474603a9f26e91abbdd17644adae15350912f6ca2
SHA512e4f8edb72ca654ba17e7a6bda1fe43ebd5b0663d689bb8362e30f477a8c50fc4f6ea8fd65922d36aaa96dc6274ac5a80736ad02dadbc21b0bff45ae8d265e362
-
Filesize
6KB
MD55552c5003461860a960bf93e6f97e05c
SHA1964a8672ece742d913a36972a6568fac4a25e4bb
SHA2565c1caf3035fe24b1879cbeeaadd04b67865ac20919df60de67ebac2e27db19f2
SHA512602269fbc81cf91f1547ae5f248678dd6d763f833eab85d00b82505155aef4be706f240227bf0ac81de25c80719f6a2026e2adba752f6e710ffe3bf5361ab838
-
Filesize
6KB
MD5501f598e58a048330c2d243be5e157fd
SHA16a17544eda4c3f6b81b5b30d21934e5d3204bb69
SHA256153670c3b8a79bc0d93e5db644a5f5f493e63549b8c53c32acb2fcf6f99ea262
SHA512d5c074aeccd362eb0d3381f09b8019d865bccfa60c165d2eaf807e9be249a32b3f382a54712e8b3dd36c266db06e919661d22d0fb8f2d569ceed710f08e673d7
-
Filesize
1KB
MD50451eb135465912a2ad302a66e453ebd
SHA144cd5f31175ce9cfa85797a05e9b84b07bc0c720
SHA256188dcb4a4932510bf881292f6c5f0ffdaa287475603a02b3c4b2374b08b8b81b
SHA51259af38899ed79351e0f0537ed24add3032039ad4042fee5e3b17cfeb276dc015d5d46666b08b626815748a2b040e0d9599a5a7a850bc00349a05bb336766b683
-
Filesize
1KB
MD5502d2c3c3d168a0cc132829721b2f0bb
SHA163b6e7fc479ae6b83f3634f3e45f6db542386a68
SHA256b989e92301d4bc14e33a51096e5460dc76ceb9e3c14c245f3c3dc7fb886388eb
SHA512d28b1f06e817445ba47c58a1f71b64adca977529601ff6fb419adb9ac7ecf05719f0d24294f36f4e28c639007655b6d28a245c531478219150f8f8e0d3fc5fb7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55be861e30603825705642dc4d3ee2842
SHA1b280f85d071c5d4b9b4a2d569405d26fa67c7be0
SHA2561bc068339d70dd73f4118d08dda6e2f16995732a442f7e0800adb493cea713e9
SHA512380f858f75d0a7ead06287e6c9810682cd52f6f9180cbec6184efe7ef55c9515cc74e647732380bf326ae71844762e041fee465a16070f95d83afb8bcba90ed0
-
Filesize
11KB
MD529da2ab9c5874faf1209039585d0a58d
SHA110f8301f11f71db8c4ff6d422f871cdbe1940cfc
SHA25688717b6e5767677e3c1577c4bb7349b920e65176ece1f7d136b4a9bfeff515af
SHA5128cb4fabe14097fa1ca71a2e27e92238493e052584243fb48eb12ccfd52326dd2410fee4c22440951d8d8076dae714f4afb93571a6b4afde86f89031b47121bd7
-
Filesize
13.5MB
MD5660708319a500f1865fa9d2fadfa712d
SHA1b2ae3aef17095ab26410e0f1792a379a4a2966f8
SHA256542c2e1064be8cd8393602f63b793e9d34eb81b1090a3c80623777f17fa25c6c
SHA51218f10a71dc0af70494554b400bdf09d43e1cb7e93f9c1e7470ee4c76cd46cb4fbf990354bbbd3b89c9b9bda38ad44868e1087fd75a7692ad889b14e7e1a20517
-
Filesize
666B
MD5e49f0a8effa6380b4518a8064f6d240b
SHA1ba62ffe370e186b7f980922067ac68613521bd51
SHA2568dbd06e9585c5a16181256c9951dbc65621df66ceb22c8e3d2304477178bee13
SHA512de6281a43a97702dd749a1b24f4c65bed49a2e2963cabeeb2a309031ab601f5ec488f48059c03ec3001363d085e8d2f0f046501edf19fafe7508d27e596117d4