Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 16:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://wipet.malwarewatch.org/malware/sulfoxide/
Resource
win10v2004-20240221-en
General
-
Target
https://wipet.malwarewatch.org/malware/sulfoxide/
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3456 Sulfoxide.exe 3308 Sulfoxide.exe 1776 Sulfoxide.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1414748551-1520717498-2956787782-1000\{2DD7B235-A354-4D3B-B926-21C17F9FB82C} msedge.exe Key created \REGISTRY\USER\S-1-5-21-1414748551-1520717498-2956787782-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1200 msedge.exe 1200 msedge.exe 4252 msedge.exe 4252 msedge.exe 452 identity_helper.exe 452 identity_helper.exe 2992 msedge.exe 2992 msedge.exe 2692 msedge.exe 2692 msedge.exe 2556 msedge.exe 2556 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2528 7zG.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeRestorePrivilege 2528 7zG.exe Token: 35 2528 7zG.exe Token: SeSecurityPrivilege 2528 7zG.exe Token: SeSecurityPrivilege 2528 7zG.exe Token: SeRestorePrivilege 4496 7zG.exe Token: 35 4496 7zG.exe Token: SeSecurityPrivilege 4496 7zG.exe Token: SeSecurityPrivilege 4496 7zG.exe Token: SeRestorePrivilege 2192 7zG.exe Token: 35 2192 7zG.exe Token: SeSecurityPrivilege 2192 7zG.exe Token: SeSecurityPrivilege 2192 7zG.exe -
Suspicious use of FindShellTrayWindow 44 IoCs
pid Process 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 2528 7zG.exe 4496 7zG.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 2192 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4252 wrote to memory of 32 4252 msedge.exe 65 PID 4252 wrote to memory of 32 4252 msedge.exe 65 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 4560 4252 msedge.exe 89 PID 4252 wrote to memory of 1200 4252 msedge.exe 88 PID 4252 wrote to memory of 1200 4252 msedge.exe 88 PID 4252 wrote to memory of 2220 4252 msedge.exe 87 PID 4252 wrote to memory of 2220 4252 msedge.exe 87 PID 4252 wrote to memory of 2220 4252 msedge.exe 87 PID 4252 wrote to memory of 2220 4252 msedge.exe 87 PID 4252 wrote to memory of 2220 4252 msedge.exe 87 PID 4252 wrote to memory of 2220 4252 msedge.exe 87 PID 4252 wrote to memory of 2220 4252 msedge.exe 87 PID 4252 wrote to memory of 2220 4252 msedge.exe 87 PID 4252 wrote to memory of 2220 4252 msedge.exe 87 PID 4252 wrote to memory of 2220 4252 msedge.exe 87 PID 4252 wrote to memory of 2220 4252 msedge.exe 87 PID 4252 wrote to memory of 2220 4252 msedge.exe 87 PID 4252 wrote to memory of 2220 4252 msedge.exe 87 PID 4252 wrote to memory of 2220 4252 msedge.exe 87 PID 4252 wrote to memory of 2220 4252 msedge.exe 87 PID 4252 wrote to memory of 2220 4252 msedge.exe 87 PID 4252 wrote to memory of 2220 4252 msedge.exe 87 PID 4252 wrote to memory of 2220 4252 msedge.exe 87 PID 4252 wrote to memory of 2220 4252 msedge.exe 87 PID 4252 wrote to memory of 2220 4252 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://wipet.malwarewatch.org/malware/sulfoxide/1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8b4c346f8,0x7ff8b4c34708,0x7ff8b4c347182⤵PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,11290993816330969688,6065035106914005442,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,11290993816330969688,6065035106914005442,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,11290993816330969688,6065035106914005442,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11290993816330969688,6065035106914005442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11290993816330969688,6065035106914005442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,11290993816330969688,6065035106914005442,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,11290993816330969688,6065035106914005442,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11290993816330969688,6065035106914005442,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11290993816330969688,6065035106914005442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11290993816330969688,6065035106914005442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11290993816330969688,6065035106914005442,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11290993816330969688,6065035106914005442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2152,11290993816330969688,6065035106914005442,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2152,11290993816330969688,6065035106914005442,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5508 /prefetch:82⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11290993816330969688,6065035106914005442,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6244 /prefetch:12⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11290993816330969688,6065035106914005442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2164 /prefetch:12⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11290993816330969688,6065035106914005442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1304 /prefetch:12⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11290993816330969688,6065035106914005442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11290993816330969688,6065035106914005442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3672 /prefetch:12⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2152,11290993816330969688,6065035106914005442,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=1900 /prefetch:82⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2152,11290993816330969688,6065035106914005442,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5676 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11290993816330969688,6065035106914005442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6328 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2152,11290993816330969688,6065035106914005442,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11290993816330969688,6065035106914005442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,11290993816330969688,6065035106914005442,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1416
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1252
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4548
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:712
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Sulfoxide\" -spe -an -ai#7zMap18195:78:7zEvent212991⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2528
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Sulfoxide\" -spe -an -ai#7zMap1407:78:7zEvent166591⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4496
-
C:\Users\Admin\Downloads\Sulfoxide\Sulfoxide.exe"C:\Users\Admin\Downloads\Sulfoxide\Sulfoxide.exe"1⤵
- Executes dropped EXE
PID:3456
-
C:\Users\Admin\Downloads\Sulfoxide\Sulfoxide.exe"C:\Users\Admin\Downloads\Sulfoxide\Sulfoxide.exe"1⤵
- Executes dropped EXE
PID:3308
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Sulfoxide 1.4\" -spe -an -ai#7zMap10040:86:7zEvent108891⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2192
-
C:\Users\Admin\Downloads\Sulfoxide 1.4\Sulfoxide.exe"C:\Users\Admin\Downloads\Sulfoxide 1.4\Sulfoxide.exe"1⤵
- Executes dropped EXE
PID:1776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51f6d41bf10dc1ec1ca4e14d350bbc0b1
SHA17a62b23dc3c19e16930b5108d209c4ec937d7dfb
SHA25635947f71e9cd4bda79e78d028d025dff5fe99c07ea9c767e487ca45d33a5c770
SHA512046d6c2193a89f4b1b7f932730a0fc72e9fc95fbdb5514435a3e2a73415a105e4f6fa7d536ae6b24638a6aa97beb5c8777e03f597bb4bc928fa8b364b7192a13
-
Filesize
152B
MD54254f7a8438af12de575e00b22651d6c
SHA1a3c7bde09221129451a7bb42c1707f64b178e573
SHA2567f55f63c6b77511999eee973415c1f313f81bc0533a36b041820dd4e84f9879b
SHA512e6a3244139cd6e09cef7dab531bff674847c7ca77218bd1f971aa9bf733a253ac311571b8d6a3fe13e13da4f506fec413f3b345a3429e09d7ceb821a7017ec70
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD52eb8177e2ee5d09d9eab822e0bd94a6c
SHA146a3fa8345addca66e522e8e235c544916da1275
SHA256206650fc7845806ff23df6a467b459df77ee8ec1c9ba28f8ef7d16ad2b2c23ba
SHA5121dd58c4eecd3f8ce0c1566c9aef4ba8b886aebd94c4b229812824ef4c999e8ca888c827f07c03a0bed711e4ee5be3955930cf7b844ca8956a50ed920d5779a82
-
Filesize
1KB
MD5fad821d845c74ab2eeac3e8451df763d
SHA1fd7875637c2f8c0387454e051081817d4aca0d1f
SHA256d9d6a71806c64a020b94680a97156deda47af301a66a8a373058ca7418eded0b
SHA51261207d40c73e8543d84daa9954faeb696be9cbe73b814167712048f12ab8bfc4f718833267769ef743a9cd2b46cf8bf8333a7a27701e0cb038169e39c64ff93c
-
Filesize
707B
MD53eb4e56b1b417f2694bcde92840bd439
SHA1da53003e388e2b7d6fc4c67299ae08057f218c0b
SHA25696c1fa72a800e520dcc875038971124cb047d0a6436cda73ef08b6068a5fa73e
SHA512a36be766dc79dd46e3afcb5c39b0d0cb14d4a69c4a3a585a2691844280323d3c9417d533fc677106e396b0c85ac7b89af16244126871a470c57c974cdf7d4f1f
-
Filesize
6KB
MD5227411623182db37153a4e8fb3dc1f7e
SHA1863ebb2a0a661a8362e278658c2b4c6fc494e943
SHA2561b274c4caf99e66309287c78df4865225424bb871d13a340afd130196e7f9561
SHA512f0aa6c65a0ac8a3715b466344a3e8fed1aef282f27b5f89f3c7cdc68c7bf85c564df483300606b9c40eaa7a77de7b7174b1df9af8c11cd1c48fe260505776b83
-
Filesize
7KB
MD5ffe7385d048338228c8dbd48b53dd089
SHA12f71f64cf2407ad7a976fe0b950202b0cac974e4
SHA256c62db4dd4ba636d73419b60f34361e29eeac19c1167053a5d721377a4d9f23a2
SHA5123cac3eabf965e26486333dc524c9d209002f653fc4bc7f4999b8b5ea2bd8cfabf42a7e0bbba6c5cb0db1c88d0c0ab5efb8a2ca7634781ecbd92e8dcd2baed784
-
Filesize
6KB
MD591e486557def03a29de4168d17df46d0
SHA19e9ee2c560f38f1574310476b903981c977ffe80
SHA2564f64f73fd0d8687746f7e5b3bfbab9d771c867635defaffac6ee1760141d8434
SHA512dc1d59786320ac108661352dbe2af23167e28423128d67bf6018e04c50a0d694b873bf8d0048d8c47e8955f179bf6547a125f8efd286f52d62a7814fbedcb77e
-
Filesize
7KB
MD5d2d6ba0df6eb06a31f3a652bdb66d408
SHA1598c8885d99dc791319347b1100c87787dcbc508
SHA2569b4e081e2e0bd18956bda17257df7b9756036c2147d12094e2c25f53caa9befd
SHA5121453026737ef19a3e94c9458b8868f72b19ffbed35f651cb91e1ea23d76a723191e12240ab3f844f13364c19116c645a0c27749d68706ae8fd22d1d6e3d8044e
-
Filesize
6KB
MD5611afa59f858842bea46555d86143299
SHA1067bab9f4b62dc65b1c85fe548b032c3a26d9421
SHA256a690d62432e3aa4a1dbdd54c32578eee94a9924f186d92939cd5303df7cd6e32
SHA512f66a06fe9927cc1e46d2d6cdfaf14579910df1026b750bf6f1e58da8f1ffad3c81e18900defd363ac8624616e120f8904e2d57664be62f48bcbad724a39d5239
-
Filesize
6KB
MD58edfbb4e91c725e10becba039aadcc67
SHA19a77d818797c661e2ea293e70ecef43cc3f1308f
SHA25656c307292aba5078c487d01652eff22a9d2d0f4a8e29a0f0cf351b37c66bd9aa
SHA512e83639c8a75a585ed65bf6e1cd068a6e56142dc159d56ef24c4e2f370959f90e9e28fe36b1b323b189705529543160f09fed0fd8577878f460ae2101d629da05
-
Filesize
704B
MD5d51cc9a6677b19596bf76d95f280f48a
SHA16bc67caa4a75cbd15bbc25cc9ae1c711f8d7bab2
SHA256b19e338b5f67f9e1cb8fa8c1c81cb443b6e6679bb2a07a3226db75640709b049
SHA5128003d1f10df6c2b27f2060cb0ed5f7c5a97410f1497d9095fc59462f605fe5945432280674036787958a0423a515049ac696127c251f4cac5f87206d7d64588c
-
Filesize
204B
MD591a356616ae9f25c2492a77d67623f4b
SHA153476b0b165912bae26c6d7607fede890b02e057
SHA256ef6d2c17ee8ba317a3e16474e80bcaf65bda9df82fd9f9d4632587c99f5e1028
SHA512628eb4a4cc4dcbb0891420650e05488da49bbdf1c35e388d76b0fbe31936def2bdc9bc6e310a65c3be5b6557f3629e67cfaec74cc212f376f7d395bcc2d2496a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD500c8b5e647671eb8231e77e913add286
SHA1fe6e387458bfbd7b2c04bff1e616be9192f7ff12
SHA256d1b29aa1b0172b5254459c04e017be82361d585a4162839b2d2f9fb497dd3685
SHA51221eb098acc9df1e981cbface6d8b90f32cdb5b51fc530fff9e96b1dcf9ff6096b9d09c8189488e2bbb006ba182889fe305593cfcaa2085d53b22fa9c74a72368
-
Filesize
11KB
MD5ff4649374178b52431683d4ab22600f9
SHA1462c4fa818123b1297d03d7ecffe244fbf6ffab7
SHA2565e075724de6ae889971209ba7e53ede08f1559b97c4aab7cdd3e06a5651298ac
SHA512f77ac05319104c694b61199dd0089f9d44b294baca3710ca13915ac05bf0259869078cb052dc47fa624f6fe0cd933197479189cc4122ed58c103e3b39c2ef9ed
-
Filesize
12KB
MD5e150c379e3c38e1f377e917b48471b83
SHA161ed4fba2f445a4829df1bba93827862aa2c8c7c
SHA256f642457a4ff5465c2b8ac70a4d9dbfc0371b1fb6d4bbea3f3fa263fb3d9605c0
SHA51230cadb7737d5bf4cecd34b852e20ca8596a8af3e448505af81cadfc46577ae289d07d41be75c5c5c5f46c89d2d18124825950d35a8bae2692740407121560c6d
-
Filesize
70KB
MD5a06a4b9f04737742961ebfc4cbbc39de
SHA13c405ad06b8f160479b3170ccc0380964df86f57
SHA256bf5130b6134c0df6086d5312d6af9b9701a8a434291fe1dc8927a58b9411df73
SHA512b3898bc6481cce9f82857cbe16d541c26f274c54e76f706cc4246193a9725ab57e88e4d110972d304c84b177039ebfdf53e02f534f32ea41ea9bdbe494d1c6ef
-
Filesize
320KB
MD58fc94fde580157356fb0186246a814e6
SHA1a7d44d37570c67b25bcc5b6ed1891b6e3b700abe
SHA2569188c9e15123585764eeaf2664acab784a64c629ad7bde14696788bd4fe9e805
SHA512383714930d92e09dce23ba2450eebc876bf5da5531f29ded21535e8f962617dd8b889f509a53933b876f50f182e902986928609a7795ad064de575fd2be20d36
-
Filesize
69KB
MD5d8ff77d8471a6203a6b290cea0552fdb
SHA1c29001ad58f3761c904052e2dde5e0fed5ee039a
SHA2564e7e9e1beb71ceb1f5f28020d433dd4d5ebdce0148491d0a51939b5dab99a241
SHA512ee771b64f9408c114e46cc3a2d56b5c84cb83a2c57d8fb6017a7c4a0f33fd8a637bf98a34f2bc3a8374fb684b57dc198cd210ef2ff38dad2b253b439aad29e92
-
Filesize
300KB
MD50dd677a9c9bdd504dd0b06676a9c5d7a
SHA1b984e3a95f89e9e43ee736e2dd66fcdd2cfe1b85
SHA25682cd406837c00a3a251490b3442322de9f101c43eec36d1208014f363c2a5ed4
SHA51285321705309deed75c79ae901ba4a74400fc97a77fb46d3594ee1735cec7419980b42cf23d14004ee789dccda257638f3a943abc42f99b9448a2069b298a0bd8