Overview
overview
6Static
static
3DDoS Tools...1s.exe
windows10-2004-x64
1DDoS Tools...oS.exe
windows10-2004-x64
1DDoS Tools...IC.bat
windows10-2004-x64
1DDoS Tools...er.exe
windows10-2004-x64
1DDoS Tools...er.exe
windows10-2004-x64
6DDoS Tools...er.exe
windows10-2004-x64
1DDoS Tools....0.exe
windows10-2004-x64
1DDoS Tools...oS.exe
windows10-2004-x64
1DDoS Tools...er.exe
windows10-2004-x64
1DDoS Tools....0.exe
windows10-2004-x64
3DDoS Tools...V1.exe
windows10-2004-x64
3DDoS Tools....1.exe
windows10-2004-x64
3DDoS Tools...er.exe
windows10-2004-x64
1DDoS Tools...e].exe
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 21:58
Static task
static1
Behavioral task
behavioral1
Sample
DDoS Tools Legacy/Ac1d-She11s.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
DDoS Tools Legacy/BFF DoS.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
DDoS Tools Legacy/Close_XOIC.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
DDoS Tools Legacy/DarkDoSer Serial Grabber.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
DDoS Tools Legacy/ExposedSYS Stresser.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
DDoS Tools Legacy/Host Booter.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
DDoS Tools Legacy/Inside_attack_v2.0.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral8
Sample
DDoS Tools Legacy/LogicalDoS.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
DDoS Tools Legacy/RapidBooter.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral10
Sample
DDoS Tools Legacy/Shockwave Booter v2.0.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
DDoS Tools Legacy/Snow's Booter V1.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
DDoS Tools Legacy/WicKds Booter v3.1.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
DDoS Tools Legacy/WinNuker.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral14
Sample
DDoS Tools Legacy/ddos em [Web Booter Tribute].exe
Resource
win10v2004-20240226-en
General
-
Target
DDoS Tools Legacy/ExposedSYS Stresser.exe
-
Size
370KB
-
MD5
9f9a1acf0f166c06ceadc74a307221ed
-
SHA1
9a0331d0d1977e7bd19fce798aac5822318da442
-
SHA256
b222476f9d7fdef99bae29d879036f1210e158b65be55c1e50401fd62d5eba4a
-
SHA512
a54d1d039911d8a80bc2cfc686f0f502df8499252add8dfe69c009a44119dba4717056a808102c0c3a3e80e6d4bb961d4eea61a177e5c0dc153cca6e550d3295
-
SSDEEP
3072:gtL/xu8fa1U/TNYs/dVsGuKq076pkaalCfPaziD81mJX8YPLM0cW1kGUoj3bFCnu:uxuuaM/ngRrmTgVb9JabPJbcYI
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 250 pastebin.com 244 pastebin.com 245 pastebin.com 246 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-566096764-1992588923-1249862864-1000\{0FB501C0-D0EF-415E-9EE8-D1E9AFE331A5} msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4292 msedge.exe 4292 msedge.exe 4808 msedge.exe 4808 msedge.exe 3640 identity_helper.exe 3640 identity_helper.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 34 IoCs
pid Process 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3656 ExposedSYS Stresser.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3656 wrote to memory of 4808 3656 ExposedSYS Stresser.exe 104 PID 3656 wrote to memory of 4808 3656 ExposedSYS Stresser.exe 104 PID 4808 wrote to memory of 3004 4808 msedge.exe 105 PID 4808 wrote to memory of 3004 4808 msedge.exe 105 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 1296 4808 msedge.exe 106 PID 4808 wrote to memory of 4292 4808 msedge.exe 107 PID 4808 wrote to memory of 4292 4808 msedge.exe 107 PID 4808 wrote to memory of 1736 4808 msedge.exe 108 PID 4808 wrote to memory of 1736 4808 msedge.exe 108 PID 4808 wrote to memory of 1736 4808 msedge.exe 108 PID 4808 wrote to memory of 1736 4808 msedge.exe 108 PID 4808 wrote to memory of 1736 4808 msedge.exe 108 PID 4808 wrote to memory of 1736 4808 msedge.exe 108 PID 4808 wrote to memory of 1736 4808 msedge.exe 108 PID 4808 wrote to memory of 1736 4808 msedge.exe 108 PID 4808 wrote to memory of 1736 4808 msedge.exe 108 PID 4808 wrote to memory of 1736 4808 msedge.exe 108 PID 4808 wrote to memory of 1736 4808 msedge.exe 108 PID 4808 wrote to memory of 1736 4808 msedge.exe 108 PID 4808 wrote to memory of 1736 4808 msedge.exe 108 PID 4808 wrote to memory of 1736 4808 msedge.exe 108 PID 4808 wrote to memory of 1736 4808 msedge.exe 108 PID 4808 wrote to memory of 1736 4808 msedge.exe 108 PID 4808 wrote to memory of 1736 4808 msedge.exe 108 PID 4808 wrote to memory of 1736 4808 msedge.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\DDoS Tools Legacy\ExposedSYS Stresser.exe"C:\Users\Admin\AppData\Local\Temp\DDoS Tools Legacy\ExposedSYS Stresser.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://exposedsys.com/stresser/support/index.php?a=add&catid=12⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6ed446f8,0x7ffc6ed44708,0x7ffc6ed447183⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:23⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:83⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:13⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:13⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:13⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3600 /prefetch:13⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 /prefetch:83⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5448 /prefetch:83⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:13⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:13⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3976 /prefetch:13⤵PID:5184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:13⤵PID:5288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:13⤵PID:5720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:13⤵PID:5728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:13⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3720 /prefetch:13⤵PID:6136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5664 /prefetch:83⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=4116 /prefetch:83⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:13⤵PID:5632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:13⤵PID:5684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6388 /prefetch:13⤵PID:5840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6368 /prefetch:13⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6344 /prefetch:13⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:13⤵PID:5568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7096 /prefetch:13⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6932 /prefetch:13⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:13⤵PID:5304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6916 /prefetch:13⤵PID:5828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7480 /prefetch:13⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8044 /prefetch:13⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8096 /prefetch:13⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8280 /prefetch:13⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8284 /prefetch:13⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7264 /prefetch:13⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8904 /prefetch:13⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6676 /prefetch:13⤵PID:6324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9100 /prefetch:13⤵PID:6484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8136 /prefetch:13⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7152 /prefetch:13⤵PID:6568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15755504129196274164,12686111031072106219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6672 /prefetch:13⤵PID:6852
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3584
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e1b45169ebca0dceadb0f45697799d62
SHA1803604277318898e6f5c6fb92270ca83b5609cd5
SHA2564c0224fb7cc26ccf74f5be586f18401db57cce935c767a446659b828a7b5ee60
SHA512357965b8d5cfaf773dbd9b371d7e308d1c86a6c428e542adbfe6bac34a7d2061d0a2f59e84e5b42768930e9b109e9e9f2a87e95cf26b3a69cbff05654ee42b4e
-
Filesize
152B
MD59ffb5f81e8eccd0963c46cbfea1abc20
SHA1a02a610afd3543de215565bc488a4343bb5c1a59
SHA2563a654b499247e59e34040f3b192a0069e8f3904e2398cbed90e86d981378e8bc
SHA5122d21e18ef3f800e6e43b8cf03639d04510433c04215923f5a96432a8aa361fdda282cd444210150d9dbf8f028825d5bc8a451fd53bd3e0c9528eeb80d6e86597
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5e98f454140ee1a073d0703155f0a2c91
SHA14008bd339e77eaedf9972c709d0ddfba057f48f6
SHA256276465d841bd9d0a0598ed669d0747db268b706b17c09b310fcd479647f1750e
SHA512f3a3a60b888d5ae3723eb82b8d253b27c44e1eef0834ae95e0f4f8b969f566439dd82cd36afb935cc05f690aff361ef92b7ef0e5af65646e9b51187d946918bb
-
Filesize
6KB
MD56a755eed1354b45596e919eabdfffa98
SHA18805246014657e4d151848689ce6ef7b0c2101af
SHA2562b7d75a763a76bed29c63236c0b71ae713b521f679fa5bb57eca83b9c6a2767e
SHA5122ee5f08648ba4302cd636b792f049becba175506a8ba296e2544f70ab5d37ec35b61649d0eabe9ef62c3a0a85599146ad1c3ff1e352b49c6b525f25d13537a65
-
Filesize
6KB
MD5e81861d3a1251ec9010c1f7dfab3b793
SHA1bcc3edcaf85a8043c195d01256bbd795c303485a
SHA2563812681ca70c199a04a8b3b1ce50df3e50154e9803e45ba63c30346487cdf9de
SHA5125ad847f68e6e546378e06d4f68f08cf0745c38255deef2271aa41a10d218b97b0fd7288494452a895c3b053d93c14f2903507b29fae73bf3d3404491e09b6d4a
-
Filesize
7KB
MD5ee5189f4a065dc484b725d9d866057ad
SHA1dea7fa53432a502389d56af285d29adb3df1ae7c
SHA256e7c02f3dc74d3c0a07c2c8b01d7e9d70eac9b58f869576674e763dde7c2f35b0
SHA5124165c8b76ce2d65dcaba35bb4223a3e541bf7494c2b8fcd8161f03d5ab8bb2310bc19a8e817495efe384daaa86a2e48d85c0dbd0ced07fea807951eb792ea774
-
Filesize
6KB
MD50c228a043e50e5c10becdac1d2d782bc
SHA12175282dc071d67a2102367804c484f136193ae4
SHA25608a7c2f19bd63e82f314008c785263272d536efa6d4beacc100ebdbc4aa9db9b
SHA512c2fbb08bf1a53ea1f687e13ea1f8ebdc3de7ab2178be11b9cb7285541b557ce6531ed4cea4cf8311a9b9e7bff0fff930de46fb6def50157a335860a83c1ddd83
-
Filesize
2KB
MD5a54e8b21e85b4e6c978f8ea238c00833
SHA1b08cda63c1b0728158b1808999d187b7faa7f66f
SHA2566f806bf631b97dfe4cdc130359d11c904e3424dfaf58544517fbd985308c5477
SHA5128833cde27d040aa6d0b3a5095e48b60c3bd2f0104fc244460fcf7d2c6760fb1b901ac5510c80aeeeedb8cec7d17db154d2303552ddd33b7ea77a854d2783ef1c
-
Filesize
1KB
MD56c00f36a7f4e01589c2722a0271f8f40
SHA14524e0abfa55850213b91a62d55688b52f78afbb
SHA256ae5588cf0416a70433ac55d6f50828da961607bc32cd5a1b4ae844c890aa0590
SHA512667d7850f9c031b0ddfc14b2fd30c1a2a057ace261679b8d663d8c584c3aa9b703f5aa58874ae8b1ee2195b00dd0d64555b3bea430798b25146ed57d3bb05479
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD522b7d675894c9cfe3f7310ee3ed7657b
SHA1bf320b009c9f37166e68f0a0876dc2613e4e65b8
SHA256842ec89c6eeb17fa8e7055d0bc56adcf582ae4dc5632d094c8a5a50e8edb3e02
SHA512db04aefe7ddd0b445de25ea4b3d71ce3812d802106167e361f4d9f4daf3cec15b99c7ba74532113ee8f9b1e97b4183d119d2c6f23e26bb6e48b7a512b38542b6
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84