Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 03:03
Static task
static1
Behavioral task
behavioral1
Sample
d50c39fcb723e1c8a00dac80cde60aae.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d50c39fcb723e1c8a00dac80cde60aae.exe
Resource
win10v2004-20240226-en
General
-
Target
d50c39fcb723e1c8a00dac80cde60aae.exe
-
Size
744KB
-
MD5
d50c39fcb723e1c8a00dac80cde60aae
-
SHA1
c87b530dec2682acb3e342bf3f6e7890221d4625
-
SHA256
3d7511e29a9d5aeec1428a1f1cc51c678449c55c55114eb3cf688bb3b45cc8c4
-
SHA512
ccd082840be373ff11508d5223ec0c06451d80ea99fb5915f499025bc8a46cf3b11653238414157b79fb736d9c7899b12d6da510d071c43c85dc0ee892f4fbe9
-
SSDEEP
6144:dOj52kI6TMykJkYRPWAN2IlzOPfxk6r+iZv+7hklykbI6TzI:8jcvRNzGfxJdUO
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: d50c39fcb723e1c8a00dac80cde60aae.exe File opened (read-only) \??\V: d50c39fcb723e1c8a00dac80cde60aae.exe File opened (read-only) \??\X: d50c39fcb723e1c8a00dac80cde60aae.exe File opened (read-only) \??\Y: d50c39fcb723e1c8a00dac80cde60aae.exe File opened (read-only) \??\I: d50c39fcb723e1c8a00dac80cde60aae.exe File opened (read-only) \??\M: d50c39fcb723e1c8a00dac80cde60aae.exe File opened (read-only) \??\N: d50c39fcb723e1c8a00dac80cde60aae.exe File opened (read-only) \??\O: d50c39fcb723e1c8a00dac80cde60aae.exe File opened (read-only) \??\L: d50c39fcb723e1c8a00dac80cde60aae.exe File opened (read-only) \??\T: d50c39fcb723e1c8a00dac80cde60aae.exe File opened (read-only) \??\W: d50c39fcb723e1c8a00dac80cde60aae.exe File opened (read-only) \??\A: d50c39fcb723e1c8a00dac80cde60aae.exe File opened (read-only) \??\E: d50c39fcb723e1c8a00dac80cde60aae.exe File opened (read-only) \??\G: d50c39fcb723e1c8a00dac80cde60aae.exe File opened (read-only) \??\H: d50c39fcb723e1c8a00dac80cde60aae.exe File opened (read-only) \??\R: d50c39fcb723e1c8a00dac80cde60aae.exe File opened (read-only) \??\S: d50c39fcb723e1c8a00dac80cde60aae.exe File opened (read-only) \??\U: d50c39fcb723e1c8a00dac80cde60aae.exe File opened (read-only) \??\Z: d50c39fcb723e1c8a00dac80cde60aae.exe File opened (read-only) \??\B: d50c39fcb723e1c8a00dac80cde60aae.exe File opened (read-only) \??\J: d50c39fcb723e1c8a00dac80cde60aae.exe File opened (read-only) \??\K: d50c39fcb723e1c8a00dac80cde60aae.exe File opened (read-only) \??\P: d50c39fcb723e1c8a00dac80cde60aae.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 164 api.ipify.org 165 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 212 msedge.exe 212 msedge.exe 1800 msedge.exe 1800 msedge.exe 2432 msedge.exe 2432 msedge.exe 6012 identity_helper.exe 6012 identity_helper.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3232 d50c39fcb723e1c8a00dac80cde60aae.exe Token: SeCreatePagefilePrivilege 3232 d50c39fcb723e1c8a00dac80cde60aae.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3232 d50c39fcb723e1c8a00dac80cde60aae.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3232 wrote to memory of 2432 3232 d50c39fcb723e1c8a00dac80cde60aae.exe 99 PID 3232 wrote to memory of 2432 3232 d50c39fcb723e1c8a00dac80cde60aae.exe 99 PID 2432 wrote to memory of 2496 2432 msedge.exe 100 PID 2432 wrote to memory of 2496 2432 msedge.exe 100 PID 3232 wrote to memory of 368 3232 d50c39fcb723e1c8a00dac80cde60aae.exe 101 PID 3232 wrote to memory of 368 3232 d50c39fcb723e1c8a00dac80cde60aae.exe 101 PID 368 wrote to memory of 2584 368 msedge.exe 102 PID 368 wrote to memory of 2584 368 msedge.exe 102 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 412 2432 msedge.exe 103 PID 2432 wrote to memory of 212 2432 msedge.exe 104 PID 2432 wrote to memory of 212 2432 msedge.exe 104 PID 2432 wrote to memory of 1956 2432 msedge.exe 105 PID 2432 wrote to memory of 1956 2432 msedge.exe 105 PID 2432 wrote to memory of 1956 2432 msedge.exe 105 PID 2432 wrote to memory of 1956 2432 msedge.exe 105 PID 2432 wrote to memory of 1956 2432 msedge.exe 105 PID 2432 wrote to memory of 1956 2432 msedge.exe 105 PID 2432 wrote to memory of 1956 2432 msedge.exe 105 PID 2432 wrote to memory of 1956 2432 msedge.exe 105 PID 2432 wrote to memory of 1956 2432 msedge.exe 105 PID 2432 wrote to memory of 1956 2432 msedge.exe 105 PID 2432 wrote to memory of 1956 2432 msedge.exe 105 PID 2432 wrote to memory of 1956 2432 msedge.exe 105 PID 2432 wrote to memory of 1956 2432 msedge.exe 105 PID 2432 wrote to memory of 1956 2432 msedge.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\d50c39fcb723e1c8a00dac80cde60aae.exe"C:\Users\Admin\AppData\Local\Temp\d50c39fcb723e1c8a00dac80cde60aae.exe"1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://andriepekalongancheater.blogspot.com/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffde37646f8,0x7ffde3764708,0x7ffde37647183⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,319082516885945282,12099882732355550330,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:23⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,319082516885945282,12099882732355550330,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,319082516885945282,12099882732355550330,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:83⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,319082516885945282,12099882732355550330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:13⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,319082516885945282,12099882732355550330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:13⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,319082516885945282,12099882732355550330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2760 /prefetch:13⤵PID:5296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,319082516885945282,12099882732355550330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:13⤵PID:5860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,319082516885945282,12099882732355550330,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:83⤵PID:5996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,319082516885945282,12099882732355550330,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:6012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,319082516885945282,12099882732355550330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:13⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,319082516885945282,12099882732355550330,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:13⤵PID:5424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,319082516885945282,12099882732355550330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6072 /prefetch:13⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,319082516885945282,12099882732355550330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:13⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,319082516885945282,12099882732355550330,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:13⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,319082516885945282,12099882732355550330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:13⤵PID:5856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,319082516885945282,12099882732355550330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:13⤵PID:5900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,319082516885945282,12099882732355550330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:13⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,319082516885945282,12099882732355550330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6384 /prefetch:13⤵PID:5996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,319082516885945282,12099882732355550330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6672 /prefetch:13⤵PID:6108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,319082516885945282,12099882732355550330,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1912 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5532
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://adf.ly/CJep2⤵
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffde37646f8,0x7ffde3764708,0x7ffde37647183⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,15957745438194729378,13233327582212915102,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:23⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,15957745438194729378,13233327582212915102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1800
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1752
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5279e783b0129b64a8529800a88fbf1ee
SHA1204c62ec8cef8467e5729cad52adae293178744f
SHA2563619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932
SHA51232730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b
-
Filesize
152B
MD5cbec32729772aa6c576e97df4fef48f5
SHA16ec173d5313f27ba1e46ad66c7bbe7c0a9767dba
SHA256d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e
SHA512425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize816B
MD5a0ad30148e195da46e675cd6444de819
SHA145420ba3c64a8f990f5a47ea358cc1584bafc0fd
SHA2565de87b07e58579f688bb0b17012631a992c05a964c43363be926a23fa37b5f0e
SHA512250ccc74b32200c42598a55f0e808b729c2e2a0c8a8b02c7a98a2d0e8503ae9591d1dd077f930966e5a96d3a37b94d134a9cf1768187b6ed9a6773106c96f116
-
Filesize
3KB
MD552f331fe11e58ba62a233a6d3002c681
SHA100b3cfdba647bbce37d5cf6ad22432a108b534fd
SHA256f0edfe7815a2b9d71425dbde802eaea8e7035f9260677fdf2da532ffac45c328
SHA5129c532d5dfbf85b0e0f90c90e9cd4603e308c8d048e756c718f1614d9c786b8e4cd6acc4d6485c7767bb4b736df409a013c14245bc707c8c187349d3af1fa420c
-
Filesize
6KB
MD58c39d11cab67c0b2a2f980559a8ada77
SHA1edfa8e9cf3462f187baeb09b1b3724f75eaf00f1
SHA256b812824d991593092200dda2b7b8669fcc080bd2f2837a0f85daa43282f5e45f
SHA5123dc7e2553ab9d0e048d8c0f1c8521db81085aa0d07c97d146d0aa3ac9543cbd5eb4063ff79ba43391d4b6bd090c785916d57511144edffaeb7af22e74328f0ff
-
Filesize
7KB
MD5f29035f91889099d22b5e1c8f5abcafe
SHA1ebb2cf03debba7ededd354ca922a42f7efea5cab
SHA2561a27f577b2b3b47e01bce0fe162cd15ae365a073537f0986dd75398446f2e5c7
SHA512f911c63afbc9d89930eaa2d21befce915e7ba18ad5f9cb51595504695969f16fa49bd32f3ead44758ac11ad4cbf89a85ce5e9777dff5cc6f4a36070847defda5
-
Filesize
8KB
MD5e626def96f9f49bc1f875017253fc8a7
SHA13233780bd8152b722fee384adc6a61d74fc45422
SHA256c94a696aa6248475b9dcaeda07c6f081d02d279cb6a0d3e93f2d1e6cd4f78b53
SHA512cb39e9bf909d809dfb6b99ee0ac7569bfad5ba882511d829c3d357f9ad6252a7b5e994408d8f4294e8d92e2b82a1e7bfc4e5f45fe2980f5bebaaa9f6ed7ec881
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5899f786b6194f8f30e2a6c61d963d7c4
SHA17c62398e8ed289fa8b6291398c210a1f028d1f2a
SHA2564228ce8ad5932977b429c45a2a164fc1109f781c070fdfaf68d936e5473598b3
SHA512da643e7cb5f4c56188d86e397bad8da9fcbb1f55ebd9bdd91430faba82dfa28579ff32671f52a91cd66c143875a03138b004c2ac6802fdecb628f58d675b61bd
-
Filesize
8KB
MD529c6a89ca8288601a62e7c6c2c993a42
SHA17041be1a62d74564ed5808383c56c0797439791f
SHA2563ccf176de07f4895898d2feebfbae1b30adf2df91b059c31f10077ac6a4f3a0e
SHA5126c16b3261aaf0c9130ffd66e5ec61fe028f00dd956c33e3aad2d3cd51afb159ab46f1ab7e7981cc71dae06bfe9b315651d493dc3c3b2067462df2c59bdbcd86a
-
Filesize
64KB
MD52ae87795b39f0c851403c35aeef2e6c3
SHA163486afec2b7a271368ca325ccf5b0cc4cd6dffb
SHA2564f16332a391245d13f393d78ec5163ff3af6b69207b247f0d946c02e8e5f98af
SHA5127e6db0cf79bafdc6191ae64082aab52edae0f37a2f97ffcbecb8471035ec86915ba07b56ef14a9ced1c42567349ca49db92a6988b32234f0d1bfd0d3e594faf9
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b