Overview
overview
10Static
static
3BUG32.exe
windows7-x64
BUG32.exe
windows10-2004-x64
MEMZ 3.0/MEMZ.bat
windows7-x64
7MEMZ 3.0/MEMZ.bat
windows10-2004-x64
7MEMZ 3.0/MEMZ.exe
windows7-x64
6MEMZ 3.0/MEMZ.exe
windows10-2004-x64
7MEMZ-Destructive.exe
windows7-x64
6MEMZ-Destructive.exe
windows10-2004-x64
7Trojan.Win32.000.exe
windows7-x64
Trojan.Win32.000.exe
windows10-2004-x64
Trojan.Win...or.exe
windows7-x64
Trojan.Win...or.exe
windows10-2004-x64
Trojan.Win...sk.exe
windows7-x64
6Trojan.Win...sk.exe
windows10-2004-x64
6Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
03-03-2024 13:45
Static task
static1
Behavioral task
behavioral1
Sample
BUG32.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
BUG32.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
MEMZ 3.0/MEMZ.bat
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
MEMZ 3.0/MEMZ.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
MEMZ 3.0/MEMZ.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
MEMZ 3.0/MEMZ.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
MEMZ-Destructive.exe
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
MEMZ-Destructive.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
Trojan.Win32.000.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Trojan.Win32.000.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Trojan.Win32.BossDaMajor.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Trojan.Win32.BossDaMajor.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Trojan.Win32.KillDisk.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Trojan.Win32.KillDisk.exe
Resource
win10v2004-20240226-en
General
-
Target
MEMZ-Destructive.exe
-
Size
14KB
-
MD5
19dbec50735b5f2a72d4199c4e184960
-
SHA1
6fed7732f7cb6f59743795b2ab154a3676f4c822
-
SHA256
a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d
-
SHA512
aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d
-
SSDEEP
192:sIvxdXSQeWSg9JJS/lcIEiwqZKBkDFR43xWTM3LHn8f26gyr6yfFCj3r:sMVSaSEglcIqq3agmLc+6gyWqFCj
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation MEMZ-Destructive.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation MEMZ-Destructive.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 MEMZ-Destructive.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4992 MEMZ-Destructive.exe 4992 MEMZ-Destructive.exe 3968 MEMZ-Destructive.exe 3968 MEMZ-Destructive.exe 3968 MEMZ-Destructive.exe 3968 MEMZ-Destructive.exe 4992 MEMZ-Destructive.exe 4992 MEMZ-Destructive.exe 3968 MEMZ-Destructive.exe 3968 MEMZ-Destructive.exe 1436 MEMZ-Destructive.exe 1436 MEMZ-Destructive.exe 1436 MEMZ-Destructive.exe 1436 MEMZ-Destructive.exe 3968 MEMZ-Destructive.exe 3968 MEMZ-Destructive.exe 2856 MEMZ-Destructive.exe 2856 MEMZ-Destructive.exe 4992 MEMZ-Destructive.exe 4992 MEMZ-Destructive.exe 1436 MEMZ-Destructive.exe 1436 MEMZ-Destructive.exe 3284 MEMZ-Destructive.exe 3284 MEMZ-Destructive.exe 3284 MEMZ-Destructive.exe 3284 MEMZ-Destructive.exe 1436 MEMZ-Destructive.exe 1436 MEMZ-Destructive.exe 4992 MEMZ-Destructive.exe 4992 MEMZ-Destructive.exe 2856 MEMZ-Destructive.exe 2856 MEMZ-Destructive.exe 3968 MEMZ-Destructive.exe 3968 MEMZ-Destructive.exe 2856 MEMZ-Destructive.exe 2856 MEMZ-Destructive.exe 4992 MEMZ-Destructive.exe 4992 MEMZ-Destructive.exe 1436 MEMZ-Destructive.exe 1436 MEMZ-Destructive.exe 3284 MEMZ-Destructive.exe 3284 MEMZ-Destructive.exe 1436 MEMZ-Destructive.exe 4992 MEMZ-Destructive.exe 1436 MEMZ-Destructive.exe 4992 MEMZ-Destructive.exe 2856 MEMZ-Destructive.exe 3968 MEMZ-Destructive.exe 2856 MEMZ-Destructive.exe 3968 MEMZ-Destructive.exe 4992 MEMZ-Destructive.exe 4992 MEMZ-Destructive.exe 1436 MEMZ-Destructive.exe 1436 MEMZ-Destructive.exe 3284 MEMZ-Destructive.exe 3284 MEMZ-Destructive.exe 3968 MEMZ-Destructive.exe 3968 MEMZ-Destructive.exe 2856 MEMZ-Destructive.exe 2856 MEMZ-Destructive.exe 3284 MEMZ-Destructive.exe 3284 MEMZ-Destructive.exe 1436 MEMZ-Destructive.exe 1436 MEMZ-Destructive.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2568 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2568 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4708 MEMZ-Destructive.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1284 wrote to memory of 4992 1284 MEMZ-Destructive.exe 94 PID 1284 wrote to memory of 4992 1284 MEMZ-Destructive.exe 94 PID 1284 wrote to memory of 4992 1284 MEMZ-Destructive.exe 94 PID 1284 wrote to memory of 3968 1284 MEMZ-Destructive.exe 95 PID 1284 wrote to memory of 3968 1284 MEMZ-Destructive.exe 95 PID 1284 wrote to memory of 3968 1284 MEMZ-Destructive.exe 95 PID 1284 wrote to memory of 1436 1284 MEMZ-Destructive.exe 96 PID 1284 wrote to memory of 1436 1284 MEMZ-Destructive.exe 96 PID 1284 wrote to memory of 1436 1284 MEMZ-Destructive.exe 96 PID 1284 wrote to memory of 2856 1284 MEMZ-Destructive.exe 97 PID 1284 wrote to memory of 2856 1284 MEMZ-Destructive.exe 97 PID 1284 wrote to memory of 2856 1284 MEMZ-Destructive.exe 97 PID 1284 wrote to memory of 3284 1284 MEMZ-Destructive.exe 98 PID 1284 wrote to memory of 3284 1284 MEMZ-Destructive.exe 98 PID 1284 wrote to memory of 3284 1284 MEMZ-Destructive.exe 98 PID 1284 wrote to memory of 4708 1284 MEMZ-Destructive.exe 99 PID 1284 wrote to memory of 4708 1284 MEMZ-Destructive.exe 99 PID 1284 wrote to memory of 4708 1284 MEMZ-Destructive.exe 99 PID 4708 wrote to memory of 3880 4708 MEMZ-Destructive.exe 101 PID 4708 wrote to memory of 3880 4708 MEMZ-Destructive.exe 101 PID 4708 wrote to memory of 3880 4708 MEMZ-Destructive.exe 101 PID 4708 wrote to memory of 4852 4708 MEMZ-Destructive.exe 105 PID 4708 wrote to memory of 4852 4708 MEMZ-Destructive.exe 105 PID 4852 wrote to memory of 3140 4852 msedge.exe 106 PID 4852 wrote to memory of 3140 4852 msedge.exe 106 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107 PID 4852 wrote to memory of 1204 4852 msedge.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\MEMZ-Destructive.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ-Destructive.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\MEMZ-Destructive.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ-Destructive.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
C:\Users\Admin\AppData\Local\Temp\MEMZ-Destructive.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ-Destructive.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3968
-
-
C:\Users\Admin\AppData\Local\Temp\MEMZ-Destructive.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ-Destructive.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1436
-
-
C:\Users\Admin\AppData\Local\Temp\MEMZ-Destructive.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ-Destructive.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\MEMZ-Destructive.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ-Destructive.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3284
-
-
C:\Users\Admin\AppData\Local\Temp\MEMZ-Destructive.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ-Destructive.exe" /main2⤵
- Checks computer location settings
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" \note.txt3⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+to+create+your+own+ransomware3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffd256046f8,0x7ffd25604708,0x7ffd256047184⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,17490161056207539892,15203651974087020536,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2000 /prefetch:24⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1988,17490161056207539892,15203651974087020536,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:34⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1988,17490161056207539892,15203651974087020536,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:84⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,17490161056207539892,15203651974087020536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:14⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,17490161056207539892,15203651974087020536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:14⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,17490161056207539892,15203651974087020536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:14⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,17490161056207539892,15203651974087020536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3636 /prefetch:14⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1988,17490161056207539892,15203651974087020536,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:84⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1988,17490161056207539892,15203651974087020536,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:84⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,17490161056207539892,15203651974087020536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:14⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,17490161056207539892,15203651974087020536,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:14⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,17490161056207539892,15203651974087020536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:14⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,17490161056207539892,15203651974087020536,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:14⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,17490161056207539892,15203651974087020536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:14⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,17490161056207539892,15203651974087020536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:14⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,17490161056207539892,15203651974087020536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2116 /prefetch:14⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,17490161056207539892,15203651974087020536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:14⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,17490161056207539892,15203651974087020536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1752 /prefetch:14⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,17490161056207539892,15203651974087020536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:14⤵PID:3836
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=stanky+danky+maymays3⤵PID:2720
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffd256046f8,0x7ffd25604708,0x7ffd256047184⤵PID:3668
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=batch+virus+download3⤵PID:3540
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffd256046f8,0x7ffd25604708,0x7ffd256047184⤵PID:4444
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+to+download+memz3⤵PID:536
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffd256046f8,0x7ffd25604708,0x7ffd256047184⤵PID:1928
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3720
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1412
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x494 0x48c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
Filesize
195KB
MD589d79dbf26a3c2e22ddd95766fe3173d
SHA1f38fd066eef4cf4e72a934548eafb5f6abb00b53
SHA256367ef9ec8dc07f84fed51cac5c75dc1ac87688bbf8f5da8e17655e7917bd7b69
SHA512ab7ce168e6f59e2250b82ec62857c2f2b08e5a548de85ac82177ac550729287ead40382a7c8a92fbce7f53b106d199b1c8adbb770e47287fc70ea0ea858faba6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5d1a8a7b2584f416bb035acec27530f1f
SHA1d54739ce748e2a32cda3a6097a96f934cbc81607
SHA25672b06dc418b40bd7140aa25050725c6d5f4067b6d4722fb7f0237c7a0cea1387
SHA5121e11163e0785df641f0b99f2e3e18e9cddf648e5310395cb0f691b1c8b0f02ebba5062862debff8e46d45cac72a3433ed766f0e1f9f87a1c1ab0cbb4f6cc2fa7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5e19f1a757a19edecdd18a9155d94dbec
SHA10ef5bbc8d42bd89c18e68a228a41490306d77b7d
SHA25653213126b95643c0d5fd4c720e5f9a979301b8657c2fe8f008b60713fed03333
SHA512c790796ed949aaa0943b0f4bb583a2586e6ee77d69b8423a26e6e668bc62ed8ba78f7968c3b087c12d500a7253d1813454a0ee161b01ce50e38fb1d946651e7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD510e34dd0bface72ce59d1baca0ad9fee
SHA12900cd27e92e200b7e0858bb8102ec4cab9a86d8
SHA256bfb925185e19f573984fa6b30c49c87d402be4e7f85a1473b0ecab6907787a77
SHA512ac1e549571cb11cc539aa688b46df546c5255bcc0f9d95fb8aa9ecaa5918256e3ffed55e793d4a7a04819885478bc8e7153a87e01b4222e24b557292e41a6ea2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD506081aa3bc4024c3bb0c04eb7f70269d
SHA1c052e83b77a1d57f60eb2dfb304d14df49046097
SHA256e552926550db48ffc44d8aeb672f6397961c455437157ebad276687ef52554d9
SHA512f3de0e870ea4a20e8e5f92f3575dbddb689c1b4c2409b10aaaf2e2203e9d59fcb98c3545d7f2f790e8205d3a322df5ca765635b9c9787869053ffff9f14ec4b6
-
Filesize
815B
MD599608cda0bba9b347b49c4fde355c7e3
SHA14949efca1be1377b2310741049b234d73ad81a83
SHA256facf55a481150237310fcbf1ba607efe644acfda908e3cb6b23db97e374fe408
SHA51271a0bc1ff8abe8ffc781629e221de7818aea7bbf554a23b9fe09f64f660c46da8d0e6367ad30ed01ba12973d1124902e64e1d1f94265bf90ea57a393713b1c14
-
Filesize
6KB
MD534d70567f800bf692f1ae8f7a42bae51
SHA19e00f49d97e1b6aa2cc0fbfc46a02eee108b0961
SHA25602ae6a959c4139653b99dc23720e67cc6f43459cb68bf2d8b15c32bb488ed2de
SHA5126c4997e566408a6b5e2ac5573a2bb3f9be0a3bc118473578c161ac3ef663bfa1cd1969f6012e68cf2469572323c72325e8be3c19bacda1c4d92e97f4e1c00b51
-
Filesize
6KB
MD558f1ac85a358db6927d1c8a452b37cd3
SHA1744e0efcc5e7b9c99c0bb92979df016877c4a621
SHA2564ca2511f9770c2c2b60c7b2785b07b5409c07df5d1aa060ac1e192f0931a0f39
SHA512824bf39b56d3bf4b2081c29dde7ca03534a39ba498941c33517f2c532d903bd9831fb7f627ef7de60bd5fa20aec25cdbe86e697564f84026c5c85b86d94271e3
-
Filesize
7KB
MD50cb01b8228a2480a8749f2385ff48d83
SHA1fa8f6c3776a402d3e5c88cedb167c2d035159d32
SHA256fd64b40fcb34d9caa2b08db01e17268e1fbbb3d4c093230b5dd7db519d676378
SHA512cca53d7a194373421ed8b2d885be7a33534faeb4cac150d4d3a5595396eb9dad39454443dd8009a4f948ffe058a71a3cd398c974105ba8f7b94d8b7aa7b814c7
-
Filesize
7KB
MD56274ec38ae40b0948dabe8d5057ce0ba
SHA1674d38a7765b05e7e7350cb90e437d53e132aeac
SHA25664b91f374280bf589e2267319a508555dd6d8a3ca07707819c32545d5e58aae6
SHA51203f46eb9b351a09d9f78f1a548d2b33f784d10b7f8e6f016d0cfbe575dd103e3ca380c6f9aedbfd14d90f5d4b240f011542cd1477f69498ac3b40259e4c871a7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b3911311-6197-49d5-bb53-c99d51590f67.tmp
Filesize7KB
MD55834923e1b1fa552b536960e62bb25b3
SHA13701f6470536efcee1f3fb0fbdbf775f3afc69dc
SHA25604a0d5cf9597fc72a48606935c2e56174d52697df0994238037b8a23123cf892
SHA5128b0a635e879dd2947b99bb6396c17be6893a465a6b6290ca2362d94783f25877f77d749ed8278c379e82d713ea2afb642aa5740c8005787a1f3231bd1ac2fef9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57234358875e274375f29a78bc643c493
SHA13f96d419825ad083e22a06318ac72d919e0881d8
SHA25609686120667e9742795f55734df35cecc730460e2296f77f87d5c7d434332447
SHA5129ed77ba46016cb692ac76ef6e95066b840170c4957ecac518d49e27e0c34c752118ce0294b8a19a03a0db4702fd7dde5a9e70ee898f4bb10f100861aeb0aaf5b
-
Filesize
218B
MD5afa6955439b8d516721231029fb9ca1b
SHA1087a043cc123c0c0df2ffadcf8e71e3ac86bbae9
SHA2568e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270
SHA5125da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf