Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 15:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mirror.endianness.com
Resource
win10v2004-20240226-en
General
-
Target
https://mirror.endianness.com
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 14 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\sig_auto_file OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\sig_auto_file\shell\Read OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\sig_auto_file\shell\Read\command OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\sig_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe\" \"%1\"" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\.sig OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\.sig\ = "sig_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\sig_auto_file\shell OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 1916 msedge.exe 1916 msedge.exe 208 msedge.exe 208 msedge.exe 2300 identity_helper.exe 2300 identity_helper.exe 5244 msedge.exe 5244 msedge.exe 5252 msedge.exe 5252 msedge.exe 5440 msedge.exe 5440 msedge.exe 1748 AcroRd32.exe 1748 AcroRd32.exe 1748 AcroRd32.exe 1748 AcroRd32.exe 1748 AcroRd32.exe 1748 AcroRd32.exe 1748 AcroRd32.exe 1748 AcroRd32.exe 1748 AcroRd32.exe 1748 AcroRd32.exe 1748 AcroRd32.exe 1748 AcroRd32.exe 1748 AcroRd32.exe 1748 AcroRd32.exe 1748 AcroRd32.exe 1748 AcroRd32.exe 1748 AcroRd32.exe 1748 AcroRd32.exe 1748 AcroRd32.exe 1748 AcroRd32.exe 5324 msedge.exe 5324 msedge.exe 5324 msedge.exe 5324 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5768 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe -
Suspicious use of FindShellTrayWindow 49 IoCs
pid Process 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe -
Suspicious use of SetWindowsHookEx 35 IoCs
pid Process 5696 OpenWith.exe 5768 OpenWith.exe 5768 OpenWith.exe 5768 OpenWith.exe 5768 OpenWith.exe 5768 OpenWith.exe 5768 OpenWith.exe 5768 OpenWith.exe 5768 OpenWith.exe 5768 OpenWith.exe 5768 OpenWith.exe 5768 OpenWith.exe 5768 OpenWith.exe 5768 OpenWith.exe 5768 OpenWith.exe 5768 OpenWith.exe 5768 OpenWith.exe 5768 OpenWith.exe 5768 OpenWith.exe 5768 OpenWith.exe 5768 OpenWith.exe 5768 OpenWith.exe 5768 OpenWith.exe 5768 OpenWith.exe 1748 AcroRd32.exe 1748 AcroRd32.exe 1748 AcroRd32.exe 1748 AcroRd32.exe 4420 AcroRd32.exe 1748 AcroRd32.exe 5584 AcroRd32.exe 3064 AcroRd32.exe 3924 AcroRd32.exe 5276 AcroRd32.exe 5788 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 208 wrote to memory of 3156 208 msedge.exe 88 PID 208 wrote to memory of 3156 208 msedge.exe 88 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 4576 208 msedge.exe 89 PID 208 wrote to memory of 1916 208 msedge.exe 90 PID 208 wrote to memory of 1916 208 msedge.exe 90 PID 208 wrote to memory of 948 208 msedge.exe 91 PID 208 wrote to memory of 948 208 msedge.exe 91 PID 208 wrote to memory of 948 208 msedge.exe 91 PID 208 wrote to memory of 948 208 msedge.exe 91 PID 208 wrote to memory of 948 208 msedge.exe 91 PID 208 wrote to memory of 948 208 msedge.exe 91 PID 208 wrote to memory of 948 208 msedge.exe 91 PID 208 wrote to memory of 948 208 msedge.exe 91 PID 208 wrote to memory of 948 208 msedge.exe 91 PID 208 wrote to memory of 948 208 msedge.exe 91 PID 208 wrote to memory of 948 208 msedge.exe 91 PID 208 wrote to memory of 948 208 msedge.exe 91 PID 208 wrote to memory of 948 208 msedge.exe 91 PID 208 wrote to memory of 948 208 msedge.exe 91 PID 208 wrote to memory of 948 208 msedge.exe 91 PID 208 wrote to memory of 948 208 msedge.exe 91 PID 208 wrote to memory of 948 208 msedge.exe 91 PID 208 wrote to memory of 948 208 msedge.exe 91 PID 208 wrote to memory of 948 208 msedge.exe 91 PID 208 wrote to memory of 948 208 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mirror.endianness.com1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb2a746f8,0x7ffcb2a74708,0x7ffcb2a747182⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,8149593342430290504,5315934855555457684,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,8149593342430290504,5315934855555457684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,8149593342430290504,5315934855555457684,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2604 /prefetch:82⤵PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8149593342430290504,5315934855555457684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8149593342430290504,5315934855555457684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,8149593342430290504,5315934855555457684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5736 /prefetch:82⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,8149593342430290504,5315934855555457684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5736 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8149593342430290504,5315934855555457684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8149593342430290504,5315934855555457684,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1900 /prefetch:12⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8149593342430290504,5315934855555457684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3696 /prefetch:12⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8149593342430290504,5315934855555457684,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8149593342430290504,5315934855555457684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:5220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2152,8149593342430290504,5315934855555457684,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5764 /prefetch:82⤵PID:5228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2152,8149593342430290504,5315934855555457684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2152,8149593342430290504,5315934855555457684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2152,8149593342430290504,5315934855555457684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2784 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5440
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\automake-1.8b.tar.gz (1).sig"2⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:4420
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\automake-1.8b.tar.gz (2).sig"2⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:5584
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\automake-1.8b.tar.gz (1).sig"2⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:3064
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\automake-1.8b.tar.gz (1).sig"2⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:3924
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\automake-1.8b.tar.gz (1).sig"2⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:5276
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\automake-1.8b.tar.gz (1).sig"2⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:5788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,8149593342430290504,5315934855555457684,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6288 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5324
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2832
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4616
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5696
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5768 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\automake-1.8b.tar.gz (2).sig"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1748 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵PID:5436
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=9AC3AF0AAB3F37D4A30FAA5900626D4D --mojo-platform-channel-handle=1744 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:528
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=C35CF6FF981A1E0F4C37D85DA8CA78F6 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=C35CF6FF981A1E0F4C37D85DA8CA78F6 --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:14⤵PID:672
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D7913F52B1895B78979E47646D6A36FA --mojo-platform-channel-handle=2184 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:5716
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=CB44EDBCE8CE9DC408096236EFDD34D3 --mojo-platform-channel-handle=2312 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:6028
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A73983BB9841735720D575DA00A8D850 --mojo-platform-channel-handle=1824 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:6080
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵PID:5596
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
64KB
MD5df645dba773854c8c1c11a8329ca1413
SHA14e182a043c9322df6c1940c206f7cb0f1cef23de
SHA256735cc31374f24f2ae600f524997ae2343dbb5eef24f38b68af524c57d500429a
SHA512ef351000d3f23e8ed43eac6c991fa885d77b3444b8522d8125c4abda6d56bda2b5ea9cb5cf1ff9e15107925e7504ace0d630d1c000eb30857a64b931cb7842b8
-
Filesize
152B
MD5fd7944a4ff1be37517983ffaf5700b11
SHA1c4287796d78e00969af85b7e16a2d04230961240
SHA256b54b41e7ce5600bc653aa7c88abb666976872b2d5e2d657bfc1147a0b49e9d74
SHA51228c58a2ccf39963a8d9f67ea5b93dbccf70b0109b2c8a396a58389cdec9db1205523a95730485bcbc9d533867cbf0e7167ad370fd45740e23656d01d96ee543b
-
Filesize
152B
MD5a774512b00820b61a51258335097b2c9
SHA138c28d1ea3907a1af6c0443255ab610dd9285095
SHA25601946a2d65e59b66ebc256470ff4861f32edee90a44e31bf67529add95cafef4
SHA512ce109be65060a5e7a872707c6c2ccce3aacd577e59c59d6e23e78d03e3d502f2707713fda40a546ed332e41a56ef90297af99590a5ab02f686a58bcbf3a82da1
-
Filesize
265B
MD5809e834fe13f3a16a3f2b48ecb0271d5
SHA1b6f14a004c5caf9dd7b55dd6faec4229cbe9a976
SHA256b85b427857a71f727c09baf1cdc89650fcccfd933a6e7913cc211ccb1b0d8142
SHA512e57f2923d3d52e7df0df3725a98dfa7ab8f4ac1db2055d4ebf00ec8bff3f646cef69abe466aa1b3079cdc23529588407649a197751687875657d7ef7291a302e
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5a5a36799ded551c80ed69e1576c89ecb
SHA1c911987f81b2fc0fcfc2d5658393e3915d61ec27
SHA2567ad5fa5c01f6c5bc4ebd9f70f1f9c7460c76a73f1a6b1c49a7f5a30a2931433a
SHA512e584b308859c37a3b8ca8eee274d34242c2c63a36efac5dded618e2ed0133952d5f21930ba7e144a6a6575de7497fa3f978d16863b83792e2a647dd0cdbca12f
-
Filesize
6KB
MD5284d21e10559d9aedd1aa65b85efcc31
SHA1ab3070cadd3911078851606e3935f0890dee443d
SHA256b601786c6b692efdad19f652d6bd66a7510d7f3b6cf7485298ea11db32304410
SHA512d7bd75d34619243f588dbdde9b9a038d6b38b49aef3d346c500b3f0293dc44140d635324be530d9fd2c1cd00b9b70a2c48e9857acaa4f9037b30748ac884455a
-
Filesize
6KB
MD5b06354a4eeaa512bbb7b992c1b3cd7bd
SHA175d862bc27a0d592ef1eb69fff483d1f135aa547
SHA2563c87b8f4d1235b914da6589dfdd5df2e4f5c12f56904a9eced71f3759bf3b92a
SHA512c6987217b80d74aca42eb7bb36e44628cc995b589a145449fe72aca064b03898f862dbde85ec3f7589c3cf4428aa790f7ebc7faf19103e91618e212db75ccbc4
-
Filesize
6KB
MD53f57ce536e1fd705bd25089d224fef7a
SHA1d15ff0e674e9d484f20677e1d93f7a0330895943
SHA256c9290e1266f3ef7b4a198fc8f3119b438a4785a6c2b8ee5692eb60aec23c2456
SHA5127878e084884d9610065cf2194aed64b8656698969f3b426c506d49a1b8a8d1a7f1b5da3260c5e5c3a6891c074dd362004f1e820bbbe32c982a887df2c97a8438
-
Filesize
6KB
MD561b8981081034a7c7993feefe4a47f43
SHA19efdee1c1549bac36c3138f4f17e7fe94c1e72bd
SHA256502dde70f7d0a5c4c5c9f38bf94f35af5dcb777352dc4d788d568b46bbb2f4e3
SHA5128419baf13e1c04c17c0f8a035643c1d7e2a01546349b24fd17a3af0c167e2e5cbac116e19510968a8eaa49a253e2593fe7a770f32a81c187a04ba3cce15b8cf0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\db8326b2-7568-4cac-9298-b5cf2e46ac74.tmp
Filesize6KB
MD55e065c1a0e1f0c6a176abe60ba4b0e30
SHA104cd7f8cdb8f8283d5be9cd58ac40c44ece0124a
SHA2568ae0d8de2517b7392ab57774e642c789db8d802190e33ca26d3f312db7216e29
SHA5126f74d428e43f0171ea522c3689e8d10a3edac354caa3023ad1115a6dc6616510b5e0acbfadf23183f51edc3d6ce1fa03bb83c9feccff87cca5e14752f593de4c
-
Filesize
11KB
MD5ae5a6f447ed645700f54c6e55ed5a417
SHA1f09a0ff0ec1cbb5d64af513e2ffbe17caccdbd35
SHA256a1289f8e2629ad87bc58f82e584538917121d1ee3855f080188b3ba6aa2044d5
SHA512d5486235ad92ce12c8ff5283ded02d88a024d0a44d6494a759e16ccd1d8d27061245ff02cde9669d85599226b6f72c2a287d659d02e20c250c332405239ff7a9
-
Filesize
11KB
MD514de1c07bf6f77b0420a765ff17a52ea
SHA19cb8e9b4d7ef5bec6743c585eef384d5413badce
SHA256da4f3babb698e488d3d3757a0147e939ca407ec9b551ffdc4beb84e7578ca5c5
SHA51260642e04a0972cd5cebc0d3bc8005f25ec20a0d4c282c8223843ea0e55e5d86e77656e2363bc961312a3a9d49fcc77f9fef52d91923d39d65a3dca43db098d0a
-
Filesize
12KB
MD51c1b6a62398a2a1397882cb7f0feca34
SHA1b27877b9362c4f96ddc8fb70495d2fbd559e6728
SHA256e3fe63e50fc7ba5ca010bab7b944605989c9016d143bf4bfd2a21fd6b6dc068c
SHA5120e5e3513072c2d03e2ff3f055bfa0dd800eabd26b0bdced44fab339594e955d728e49422b03a37b3ed60e355a16ef018304c7a0900b118870571d18037f63860
-
Filesize
11KB
MD50fcf8ad0dc0770b2a3d46f1d934c76c9
SHA14c4e2aa04d3de7e29f0fbcb074c8554d52a6ae36
SHA256f2557b26216df644541caaad796b1448c99dbed1e76d30e4247b4a80c3cd10e1
SHA512a250799a6c779eeb9359ed7537a05333bf2c1f779fa34fe56e6d62195f9a2c83978cb0473ed9b90ca5ab7f4df1a5f7509f0c5f61afe9fd9f6b5ff5b8b1c50e9c
-
Filesize
189B
MD5bd1edb33d3166fb22148052dc4daa057
SHA183ae2eadabe6694a75aaa9519b306c85d270953e
SHA2564bacbf47021682121edf546d781082220e147d471b791b7aeff2c8dadda63a0e
SHA5123a2ae9531ec555c913b929c9e9b47517c32e9d94c82585732ba1283dccecb8a846009313e7e4462e3875c137fd4837b99fca843b2794056534bda9c104037019