Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 17:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1210998395968163890/1210998412183339048/message.txt?ex=65ec9928&is=65da2428&hm=ca814df6aef96ff40edd96d10014f7588bfb95aef73c04bfa96cc606368f581c&
Resource
win10v2004-20240221-en
General
-
Target
https://cdn.discordapp.com/attachments/1210998395968163890/1210998412183339048/message.txt?ex=65ec9928&is=65da2428&hm=ca814df6aef96ff40edd96d10014f7588bfb95aef73c04bfa96cc606368f581c&
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949 msedge.exe Key created \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe\Children msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\DisplayName = "Chrome Sandbox" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Moniker = "cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe" msedge.exe Key created \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Children msedge.exe Key created \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage msedge.exe Key created \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1392040655-2056082574-619088944-1000\{CB6909A4-B88F-409C-BF87-A1F3B6C90702} msedge.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 388 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 3484 msedge.exe 3484 msedge.exe 4852 msedge.exe 4852 msedge.exe 4232 identity_helper.exe 4232 identity_helper.exe 1416 msedge.exe 1416 msedge.exe 2292 msedge.exe 4788 msedge.exe 4788 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4852 wrote to memory of 5084 4852 msedge.exe 52 PID 4852 wrote to memory of 5084 4852 msedge.exe 52 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 2848 4852 msedge.exe 87 PID 4852 wrote to memory of 3484 4852 msedge.exe 88 PID 4852 wrote to memory of 3484 4852 msedge.exe 88 PID 4852 wrote to memory of 820 4852 msedge.exe 89 PID 4852 wrote to memory of 820 4852 msedge.exe 89 PID 4852 wrote to memory of 820 4852 msedge.exe 89 PID 4852 wrote to memory of 820 4852 msedge.exe 89 PID 4852 wrote to memory of 820 4852 msedge.exe 89 PID 4852 wrote to memory of 820 4852 msedge.exe 89 PID 4852 wrote to memory of 820 4852 msedge.exe 89 PID 4852 wrote to memory of 820 4852 msedge.exe 89 PID 4852 wrote to memory of 820 4852 msedge.exe 89 PID 4852 wrote to memory of 820 4852 msedge.exe 89 PID 4852 wrote to memory of 820 4852 msedge.exe 89 PID 4852 wrote to memory of 820 4852 msedge.exe 89 PID 4852 wrote to memory of 820 4852 msedge.exe 89 PID 4852 wrote to memory of 820 4852 msedge.exe 89 PID 4852 wrote to memory of 820 4852 msedge.exe 89 PID 4852 wrote to memory of 820 4852 msedge.exe 89 PID 4852 wrote to memory of 820 4852 msedge.exe 89 PID 4852 wrote to memory of 820 4852 msedge.exe 89 PID 4852 wrote to memory of 820 4852 msedge.exe 89 PID 4852 wrote to memory of 820 4852 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1210998395968163890/1210998412183339048/message.txt?ex=65ec9928&is=65da2428&hm=ca814df6aef96ff40edd96d10014f7588bfb95aef73c04bfa96cc606368f581c&1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff099346f8,0x7fff09934708,0x7fff099347182⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,16142382514294843118,7556609528020876177,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,16142382514294843118,7556609528020876177,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,16142382514294843118,7556609528020876177,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16142382514294843118,7556609528020876177,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16142382514294843118,7556609528020876177,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,16142382514294843118,7556609528020876177,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,16142382514294843118,7556609528020876177,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16142382514294843118,7556609528020876177,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16142382514294843118,7556609528020876177,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2076,16142382514294843118,7556609528020876177,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3352 /prefetch:82⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16142382514294843118,7556609528020876177,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2076,16142382514294843118,7556609528020876177,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5888 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16142382514294843118,7556609528020876177,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16142382514294843118,7556609528020876177,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:1344
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\message.txt2⤵
- Opens file in notepad (likely ransom note)
PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16142382514294843118,7556609528020876177,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6488 /prefetch:12⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16142382514294843118,7556609528020876177,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16142382514294843118,7556609528020876177,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16142382514294843118,7556609528020876177,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16142382514294843118,7556609528020876177,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6968 /prefetch:12⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16142382514294843118,7556609528020876177,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7056 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16142382514294843118,7556609528020876177,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1312 /prefetch:12⤵PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=media.mojom.MediaFoundationService --field-trial-handle=2076,16142382514294843118,7556609528020876177,131072 --lang=en-US --service-sandbox-type=mf_cdm --mojo-platform-channel-handle=5372 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2076,16142382514294843118,7556609528020876177,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5564 /prefetch:82⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2076,16142382514294843118,7556609528020876177,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=6480 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,16142382514294843118,7556609528020876177,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5648 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4820
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4936
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5f19949ae6830f2e4cb1f3358671f6e9b
SHA1641f2788e6df4de3b6f499c595795d8130e3b66a
SHA256433dde5f3972bbf9ffb0750ff03f87ebbb79f4293c2ca9af9abf3bd3ac5b8507
SHA512f250c0844268c5d98a99fbe650ed055053f83da5dc3c2f31312062d4a39715931cfb45399c4e28d04b30a2961c57b2eef939360d9a11366c28d5785159a23d66
-
Filesize
152B
MD5343e73b39eb89ceab25618efc0cd8c8c
SHA16a5c7dcfd4cd4088793de6a3966aa914a07faf4c
SHA2566ea83db86f592a3416738a1f1de5db00cd0408b0de820256d09d9bee9e291223
SHA51254f321405b91fe397b50597b80564cff3a4b7ccb9aaf47cdf832a0932f30a82ed034ca75a422506c7b609a95b2ed97db58d517089cd85e38187112525ca499cd
-
Filesize
152B
MD5d4c957a0a66b47d997435ead0940becf
SHA11aed2765dd971764b96455003851f8965e3ae07d
SHA25653fa86fbddf4cdddab1f884c7937ba334fce81ddc59e9b2522fec2d19c7fc163
SHA51219cd43e9756829911685916ce9ac8f0375f2f686bfffdf95a6259d8ee767d487151fc938e88b8aada5777364a313ad6b2af8bc1aa601c59f0163cbca7c108fbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD505f977b8c575287f31eab265d9a2bfbc
SHA1ee9aaa77ad942aa1a4aad4e2304f722b3b2ba4da
SHA2563afe6f0af97f6be2ce9e4342163927dabf110576ae29fd26eedd1c439c4fbabc
SHA512183940572d098bd1e5bb141886eab623dee398ef23ffa4358e8f24d89ff95620fa379c09182f0394f99c77a4d3e2e45cc92e315751fbf6dea76b5962660ce596
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD542ecc07e4e52052b9a3f7b6957e7dcaf
SHA167be31f76cf22ef2729b2a587e2653defc736e51
SHA256596e8d35c480eb7aa3b464e3a9cd2dc5d3462eab4e0b6c37cc3c8cb9a529abe3
SHA512cf09c5a628519fc1486962bacd455f89f6f6c04ad6c39d87bbf4702370d57d872df839e97cada4198f183c3ec2db48e6493e10562b0f1090474e44f7348237fd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5c455b125f46757322a0dd3272bd576ca
SHA108efb335a19228d1227bf8fb877ff92fe9745783
SHA2566ad30c77b3f09e19f72cbda4fcc6d60cc5428f30acee2bd7890433415b56f8ac
SHA512a3f7db820d5e86583d4676fefcb0427faef50dbeeb59803f639ff43a70f528721a2cd2c6e69e093726fc0b49210f61b92c64311b25502e6fa0f9252ecd5d2caa
-
Filesize
924B
MD52e522023e783dfa04630ac84f6d567d5
SHA12a769b1e6bda7f7c0be987e369e68d27cf711bee
SHA2564e55fa5bfd78824bc454ade92a3591434f50b6dd93d55aa7e288d7dc2ccdf06e
SHA512a8f98c759c1dd405b4fc31d04d6dce912c9b4e123fe54a78e3cff78f22878e0332c0dae0f81d824e40c1b924fec1a1aeacaf7e442ab651bdebc068c7608488b6
-
Filesize
6KB
MD5dfa4f67233821a5fbdae71c7dd82d944
SHA19d724be77ba7570dd3e8120721d2c0168a981be4
SHA256fc28c4b7455864582c5ee0bad986bb859ae8edd5127181c55a8326f4073c1a15
SHA512998eeff00249d73c47afe7b51e92cfeb4899f440953d9847e2f8a68f569261681b7d64a1e092bb0efe38b031931a4f8e3bd696cf5d3c57cd6657cce273bcb93d
-
Filesize
6KB
MD5afa9d53f7fbc969fcaca68a8cf4580fd
SHA1921be788f4436e2bef2499c79398461284b98b42
SHA2569b7af8f91a4323d74e9bd46a67bd9ca7bbf2346b6d5d5a86d57c57a07b6fa329
SHA5128a18125721109fcdc22832b690b63345eca3c3d7e44c94a1d4676f89a11c90d86038ac347315320679ee4b193ee4819a779aea42e81d54f85a1b4be3e4ecf82b
-
Filesize
6KB
MD52835320a784d6714222153117a0e9840
SHA1b380a3bd718cc04590123a922727e8d687b14e2a
SHA256d053c82ff5e8c035f535771740edd0df25a2f37b7699ff6302b67da0b91e40ce
SHA51295035f4cd05b91d8bb5a6de2374f368e4cdf8e0bd61312f3b382bcf71a6cc9a0bccc5d4b932cfd4f29eafe2a4c297793a460a151a39cd1beebcab8deb483b367
-
Filesize
6KB
MD5ceef66732db27ff01ee6dcdf02883a99
SHA1cad1fd49ee5484e1ec8468d31a1e579fe50a9d6c
SHA2564b42de782d2d53c9a9105cd2ad97961390fa4d46fb323b7bde112a6491d22fbc
SHA5122dc6f4b4bc6a2804429b636c11977f4220f4803ff18aa392266b47924c55b2891530491dfb2f15bb59abb09d92fc9f8b0fe37ae7356d8f69e9210861e58e82c2
-
Filesize
1KB
MD58c8810fd6d313492e760aba7cb3ae325
SHA196c0bab29a3e6cea23ed871987caedf5cea98005
SHA25653d60d110327a6ea28e1e732040e0be8eea87a73750717678de5ce177e8636ff
SHA512e36287a8b6e4d886a56b43397c8c74a206fc4df57672e42014b95b8589e8d81484a0aa2f369db13286d1bf2c08aeec3521b08485050fe240f0254d098452c9c9
-
Filesize
1KB
MD50ee1e7ecd1d0e4a57637839251a75135
SHA1890f61957d17c2e37df58d61a9f0212620a683d1
SHA2563626f85e37b326be4584b0928f66ff738d7cc856407d16f05b26f0ffeb52e4b8
SHA512357cd591df2efeb867a5c068d608ddc6a070bd2beadc928b9a98eb4132eb9eec56a59b86f75df0183974bb002a49f19c81850a968e9780962aea590219e357b3
-
Filesize
1KB
MD5596794576392e16fb1736b127a116656
SHA184c3f2c9d25c50d8fec1a2d203584930757df0ac
SHA2566b57f26ae4e3ea7bd53996c9095728918438413a4ae529377d74f6ff71990749
SHA512d9ec4c264c8e5034ae8ac006130e57dcdc9e6fe34dad79f801f420cf951a6150caed09fe9d0ce96be5092c35682bb11bd8fc8d46337deb65d23c1899511f5c95
-
Filesize
1KB
MD59fdb92adc8bf29c4b9b67ca39811dacc
SHA193d401c609271e7e14525a2d90cac74154738c5a
SHA2568747d6377dc3e871e2477dcbce020ea4aa21d87e199db3779b15426c6b92eeca
SHA51258658ba83930f71316da8ed79d39c6a6dba439765ec08b6a896b46182c8296d274e10e66b19c9a07c3e4ad5a70ab1b8657da12cbad27d6845665d99e8ae7d868
-
Filesize
1KB
MD522ac5d2980997901194722d610f4c8b0
SHA1508303841d38821d38211ef62ebe4031b6476e76
SHA2567324d8f3ea31e3b7e01930f1a528b3f7e3f4947c963d2ed8b9901df26d5ee0ae
SHA512142021b2754c93ecfd47612f90b41f0d179394cad3570af74ce6c3bc7f4a1c5d606e85478e827b041af5b4e53a40e8c98ae53f2944e81a3c43422564e4ca954a
-
Filesize
1KB
MD57d086c12d1425b3abf3c93f5466a03f7
SHA1aa2782802f479b7ea282be0a35ef613688d8e527
SHA256d1c4d5d82dc244610cbdff4e9d8dca82eadb0e3b3ccd69bc4a7ea015f65a379f
SHA512b53dd704e69e74fbe181b9989bfccbeea8bb194b8681bc32c02367f11e89bdbc350384704a889ad0269fe6c07f348d6dd80df0e5d09baf078e33f19b0d1bcb8d
-
Filesize
1KB
MD54cccd9f813a389af7fae626547dfecde
SHA10b2884cc0261c88a5a54b5c1e4be8fa259d0b2a2
SHA2569d02deda411f5487bff8cad88db20c1f0a366986e95241c7b7a20d4e0ab0bbfa
SHA5122132871217b9e16e1ada02a70db7f5acda052e5e77db0a312ca2fd75f097371c74680d0cdea006aa1bc371991212ce17ad05289c60478264ae3ee12538242f61
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5833bbad49856e1b4dfa671f195453a1c
SHA1c8f075227db86aaf9f6d926210b017b83c4eb05e
SHA2568984151f0e6b82fa6aa038ac026b5ed6669fd3e77aafdf89a0760e572777a9d2
SHA512a04e0898ba35015f520c67a3b481b6bebc7bd1ef604a8c96ed1403ce058f2142fc75f0c4e0f08417f156695221ecd67a0085e12f523123266274014a1968c58f
-
Filesize
12KB
MD5346a993e3b3276aa7fdd5c31abbed9ae
SHA1dca885890b0b686a78eed6ec70121e4e2bf16ed4
SHA25692539b304f56bfcd329ac1e6b000c79db998a06fdaad533d8ad38d12808863a6
SHA51201b67dd8feb24e5221a5142f62a343e5fe394b7d81792f6a1e94204455e5c506c2ea171127e4189eaf906f6022d7972599307274209a979bf122be11cd855978
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
6KB
MD5f5dbea75a735527a3f008966cd10e1d8
SHA130da5c7abc9d004de6b3a3bd2073afb13c612028
SHA256176bbea82acc369685b7e7ca4b5f462b1875a6a08281a9950988eadac23712d6
SHA512db364c49b717a9bcbf965364693d2203e019790286711b14d3ff156fadb721095d2234677bfbc7061a670ff05a99e441eea102917457a7a15973494995b3d25b