Analysis
-
max time kernel
647s -
max time network
644s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-03-2024 19:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ezcheats.ru/gta5online/kiddions-modest-nakrutka-deneg-razblokirovka-predmetov-i-prochie-veselye-chity-dlya-gta-5-online.html
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
https://ezcheats.ru/gta5online/kiddions-modest-nakrutka-deneg-razblokirovka-predmetov-i-prochie-veselye-chity-dlya-gta-5-online.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
https://ezcheats.ru/gta5online/kiddions-modest-nakrutka-deneg-razblokirovka-predmetov-i-prochie-veselye-chity-dlya-gta-5-online.html
Resource
win11-20240221-en
General
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ modest-menu.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion modest-menu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion modest-menu.exe -
resource yara_rule behavioral2/memory/5884-377-0x00007FF6A1820000-0x00007FF6A422F000-memory.dmp themida behavioral2/memory/5884-379-0x00007FF6A1820000-0x00007FF6A422F000-memory.dmp themida behavioral2/memory/5884-380-0x00007FF6A1820000-0x00007FF6A422F000-memory.dmp themida behavioral2/memory/5884-390-0x00007FF6A1820000-0x00007FF6A422F000-memory.dmp themida behavioral2/memory/5884-391-0x00007FF6A1820000-0x00007FF6A422F000-memory.dmp themida behavioral2/memory/5884-392-0x00007FF6A1820000-0x00007FF6A422F000-memory.dmp themida behavioral2/memory/5884-393-0x00007FF6A1820000-0x00007FF6A422F000-memory.dmp themida behavioral2/memory/5884-406-0x00007FF6A1820000-0x00007FF6A422F000-memory.dmp themida behavioral2/memory/5884-427-0x00007FF6A1820000-0x00007FF6A422F000-memory.dmp themida behavioral2/memory/4956-429-0x00007FF6F1F40000-0x00007FF6F494F000-memory.dmp themida behavioral2/memory/224-431-0x00007FF6F1F40000-0x00007FF6F494F000-memory.dmp themida behavioral2/memory/4956-433-0x00007FF6F1F40000-0x00007FF6F494F000-memory.dmp themida behavioral2/memory/4956-434-0x00007FF6F1F40000-0x00007FF6F494F000-memory.dmp themida behavioral2/memory/4956-435-0x00007FF6F1F40000-0x00007FF6F494F000-memory.dmp themida behavioral2/memory/224-436-0x00007FF6F1F40000-0x00007FF6F494F000-memory.dmp themida behavioral2/memory/4956-437-0x00007FF6F1F40000-0x00007FF6F494F000-memory.dmp themida behavioral2/memory/224-438-0x00007FF6F1F40000-0x00007FF6F494F000-memory.dmp themida behavioral2/memory/4956-439-0x00007FF6F1F40000-0x00007FF6F494F000-memory.dmp themida behavioral2/memory/224-440-0x00007FF6F1F40000-0x00007FF6F494F000-memory.dmp themida behavioral2/memory/4956-441-0x00007FF6F1F40000-0x00007FF6F494F000-memory.dmp themida -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5884 modest-menu.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4532 msedge.exe 4532 msedge.exe 1676 msedge.exe 1676 msedge.exe 4296 identity_helper.exe 4296 identity_helper.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 3804 msedge.exe 3804 msedge.exe 5884 modest-menu.exe 5884 modest-menu.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3512 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4532 wrote to memory of 220 4532 msedge.exe 88 PID 4532 wrote to memory of 220 4532 msedge.exe 88 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 4012 4532 msedge.exe 90 PID 4532 wrote to memory of 1676 4532 msedge.exe 91 PID 4532 wrote to memory of 1676 4532 msedge.exe 91 PID 4532 wrote to memory of 4804 4532 msedge.exe 92 PID 4532 wrote to memory of 4804 4532 msedge.exe 92 PID 4532 wrote to memory of 4804 4532 msedge.exe 92 PID 4532 wrote to memory of 4804 4532 msedge.exe 92 PID 4532 wrote to memory of 4804 4532 msedge.exe 92 PID 4532 wrote to memory of 4804 4532 msedge.exe 92 PID 4532 wrote to memory of 4804 4532 msedge.exe 92 PID 4532 wrote to memory of 4804 4532 msedge.exe 92 PID 4532 wrote to memory of 4804 4532 msedge.exe 92 PID 4532 wrote to memory of 4804 4532 msedge.exe 92 PID 4532 wrote to memory of 4804 4532 msedge.exe 92 PID 4532 wrote to memory of 4804 4532 msedge.exe 92 PID 4532 wrote to memory of 4804 4532 msedge.exe 92 PID 4532 wrote to memory of 4804 4532 msedge.exe 92 PID 4532 wrote to memory of 4804 4532 msedge.exe 92 PID 4532 wrote to memory of 4804 4532 msedge.exe 92 PID 4532 wrote to memory of 4804 4532 msedge.exe 92 PID 4532 wrote to memory of 4804 4532 msedge.exe 92 PID 4532 wrote to memory of 4804 4532 msedge.exe 92 PID 4532 wrote to memory of 4804 4532 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://ezcheats.ru/gta5online/kiddions-modest-nakrutka-deneg-razblokirovka-predmetov-i-prochie-veselye-chity-dlya-gta-5-online.html1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbbd6a46f8,0x7ffbbd6a4708,0x7ffbbd6a47182⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,16022419624428325479,2788922793943126639,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,16022419624428325479,2788922793943126639,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,16022419624428325479,2788922793943126639,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16022419624428325479,2788922793943126639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16022419624428325479,2788922793943126639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16022419624428325479,2788922793943126639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,16022419624428325479,2788922793943126639,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5892 /prefetch:82⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,16022419624428325479,2788922793943126639,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5892 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16022419624428325479,2788922793943126639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:12⤵PID:5404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16022419624428325479,2788922793943126639,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:5412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16022419624428325479,2788922793943126639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:5636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16022419624428325479,2788922793943126639,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:5644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16022419624428325479,2788922793943126639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1748 /prefetch:12⤵PID:676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16022419624428325479,2788922793943126639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:5384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2084,16022419624428325479,2788922793943126639,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6368 /prefetch:82⤵PID:5512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16022419624428325479,2788922793943126639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6504 /prefetch:12⤵PID:5476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,16022419624428325479,2788922793943126639,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=7036 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2084,16022419624428325479,2788922793943126639,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1596 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3804
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:900
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4552
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4512
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5932
-
C:\Users\Admin\AppData\Local\Temp\Temp1_modest-menu_v1.0.0_.zip\modest-menu.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_modest-menu_v1.0.0_.zip\modest-menu.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5884
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3512
-
C:\Users\Admin\Desktop\a\modest-menu.exe"C:\Users\Admin\Desktop\a\modest-menu.exe"1⤵PID:4956
-
C:\Users\Admin\Desktop\a\modest-menu.exe"C:\Users\Admin\Desktop\a\modest-menu.exe"1⤵PID:224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e494d16e4b331d7fc483b3ae3b2e0973
SHA1d13ca61b6404902b716f7b02f0070dec7f36edbf
SHA256a43f82254638f7e05d1fea29e83545642f163a7a852f567fb2e94f0634347165
SHA512016b0ed886b33d010c84ca080d74fa343da110db696655c94b71a4cb8eb8284748dd83e06d0891a6e1e859832b0f1d07748b11d4d1a4576bbe1bee359e218737
-
Filesize
152B
MD50764f5481d3c05f5d391a36463484b49
SHA12c96194f04e768ac9d7134bc242808e4d8aeb149
SHA256cc773d1928f4a87e10944d153c23a7b20222b6795c9a0a09b81a94c1bd026ac3
SHA512a39e4cb7064fdd7393ffe7bb3a5e672b1bdc14d878cac1c5c9ceb97787454c5a4e7f9ae0020c6d524920caf7eadc9d49e10bee8799d73ee4e8febe7e51e22224
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD5c09c5f0438597c4679ee81476d383885
SHA1a728acc9c34a01a7feb7fd5b933662e2e4451157
SHA256c90f4d54b282ca6dc701bac60faa7daa1a147b3a1f3207cf7a10d76eb7b50caa
SHA512a30c47f8e6ce3eb55d1d52f3acf37ea914f91c6bdad8c5d1279a8d6d6a91059f6bc23517d7998c4b6754715ecaa4a7003d9ebe643a49bee0232d0f8b9788e96b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD5b8fb31ff82c9d993d62de516159a655b
SHA1b295cfa542be3110dd74b78466cdbeefd331397f
SHA256b16283e4aab4d76a453461ca33fcf7f304d7980cad9d38df94173a546609fef8
SHA51269d03b717265809304b6fa4db044a203e5a036bd4af4222aab83c4e5846defafab9c506e40f4a46cd84444a44564fe9d76103b647b7d08e788686ecf7194d14b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\File System\001\t\Paths\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
3KB
MD523ba971e16dc6f80fccaf421d78da602
SHA1fdc2b8c5bbc213415c1b3692895e4c7577ecf766
SHA2567e33a3cb73b4c5049d916567cd0049d14f16ca72f37615c66e1cf8408a1da73f
SHA512bba494700aeda0dbb77936d52004a0dbd2584dac871636184c6d69fb846804e79bd07ee61bf30dce95757a3f822713ed094e6635249315ba57ffd6eb5deb6aa4
-
Filesize
3KB
MD5c3fed0835396fb8278e84b227dc44066
SHA12182c02ac1d33855d8566e13ddb32734be6ef554
SHA256cb362b639c0bcfe961292953355b26f93e14bdec52474f9b78cdce7030116c60
SHA512eb35c803357118a195c0a3a28dd8f0e8042f1711d84ddbca25ec9ddf4978ebf1845b6f5bd7f7b8a23561dc07e4967767695ffd23c1a365bcb3765c2c7766ab4c
-
Filesize
3KB
MD5b07b8b72945822398fdff559c744512b
SHA1c1f8e3a9c305eb8ae1bdf704766eb1db87834d8a
SHA2560e8809fab52e0a1b45ef675bf809a04ef8e351094e72b77c548755ff40d7970b
SHA51204eaae258e1e516a7bc51e40884b776d8af557518f4d51d01ca08b513f2d158d3163719b73c20ef316a85898024e895388da169bb16d49fe665bd73c8d43240c
-
Filesize
6KB
MD541534730b63611ee82f346a62b5e720b
SHA14a353f14a81fdc67057e279c16a4be2a51e667c4
SHA256b82decd44944b65a8da0612b17611951ffa40239dc19e84f22d3f22e79549c9c
SHA5121ed52eef4008d52a4fce4420934e479f6697a9a7ba6849327949617ebc64d77abc76f1f8941ab82c593cb3bdc6ae3e66843c7e164241852aa36deb92df2665b4
-
Filesize
8KB
MD5571296e97a1d67345b383625a47b2981
SHA13aacafd98a91b92ff193ea725535a8e68e94097f
SHA2565966c42a2a1f907d7b5de388b2bf19cafe6213d489e2989a7f40a64010f19829
SHA51263c26fa6ed0a80ad3d03ea81bea05d0b5fdbc977e1ecb5c1cf45c40458a028c42285c3ff6d7a7dcbcf56aa576554ba29c8ff256cbd197de9a8ab3ad2d19d5564
-
Filesize
7KB
MD50bc812b2bf8dd981484079a8d9806818
SHA1590353d8b4ec1030f63c8c1230089288d59983a7
SHA25664bbfb9d46a62d3f1c31c30defc898988114f80c0c46dd2e0860f12fefc25474
SHA51232a286229384b9286cfd36512a83ea22056506b962e16c88290dbd338b202a22f284ecee3da27e592f1e23777767f215496ba916add1bd7a83db33487bbb3dd5
-
Filesize
8KB
MD5d4e0715b61ad967cd2004cbb4494da54
SHA1e697c5168808634939707c8dc32362e612456faf
SHA25675997b1fddb4f255b7ed17dba6f5d177c5f22bd4f716474768e562b511db8a8f
SHA5127636b61ded2de77d6e538b11ae4819b89851b2eec9f9d6f39aba3c72a6adf30b4f66a4feb917ac1fb7e7ed059d26a76403d378d1e9542edcf9dc8336b0336beb
-
Filesize
1KB
MD5d3f33c7168fd7d4d03352ca632af53d3
SHA17052e452ca63bb1ab3d32e8afd24d3fcf3ce540d
SHA2564976f061c17d40235749966672f9ddd33d5da34eecc85b4b07a2441bb4c3eb61
SHA51216d663dc850b723d25f988b43e703f936a76a24f405f0ab068dde542ca1b02b42223c91d818b09cb826c3113cc2a3b79f4fa0347bd28c287d4f398a861d1c027
-
Filesize
1KB
MD50e959414a04200211dd68f376a318caf
SHA1789be25e70d2ade3f6f37c2108d155ff6ae3f359
SHA25636904931e82babb6546578547a8e633a4de5efea9d086d87d123dc55abfb34ed
SHA51251b97d2690d21106763967ff1bff70ef02454cfdfcdcb82a4dc15e687e6aa93753c4df57b20db5d818bdf60cc7474c090fe02a947dbf6a99e3079e9cdea7396e
-
Filesize
1KB
MD56d0c2d5d11e70d7ab2a083802c8d94ce
SHA15f0a52332dd0601888d0324d4f2ff9c628fa96d9
SHA2564ab80de59e4142ba0a681dcf977d59c979a102a2cee8abc7a5f1e0b0e5e371f6
SHA51234776bf90340c2a958774562dc5332f64d5fe9954941b8bf7a96996ff6124fad397b534e9e9e466362ba6de8cb5cb46fc9625736f890f0851f7e664b5c198052
-
Filesize
1KB
MD5630162f632322c09c7d36e7a934e82ee
SHA16b67c9461f1a4a93a48c271c038bdc3c351ef70d
SHA256545c8852c19b41a72e0df375c26ac315a5c8a99e0d5a2893f22434f3e87ea3c7
SHA5129620e7cf9aecb150984067fa0dd1a93abf33b08c0a10f9a54a4f336f700edf35130d963d5a99d66e918a332ad132759a8224aa205099602098aef8f353d04b49
-
Filesize
1KB
MD589850362c0f8c5a93207ec6057db520c
SHA17140f13275f05b9030fa1a32b4d5a91efceca287
SHA25671766c2403b71a84ea7a6af0c5fdb8e14d2c1f6abc06de8041a62bb78a7bd15d
SHA512a5ff59e7ec27b6765a42f4509d42418a8c57ac69aa4e22bee24859bf04b1b1ba857ea6c51cf6f503df8bf70a659b4f50bc6138f832ae7111482c12d9688e0615
-
Filesize
1KB
MD5f7162447a8596d4f09dcf3e14639ae50
SHA198df5c7161a822258aed6cfb60c2485943c657e8
SHA2563e5128df887775650cd9ba2913b72174528e978268ad51d8e30e824a158a3e66
SHA512c2c8526850aa8dcc03c3b0db9d5f92afb54180c78191f1e86a12303a3a334c90c28abf29f7eb88a0c7d90d19acaee68f5a8feb3f5593bf180d5fcab57092f9b7
-
Filesize
1KB
MD52abe3f36574b830a3ef66440d2d62d7b
SHA182257ade0e2d10a138ad3f45a71a3476336e5eaa
SHA2567b30a2fc699eb8513dccb7d10ce2e2f09ff87a597eff0559a4d30d0becde9843
SHA512a6f983fbab0256df7464a618547a8c2a6b3ee809539291ea4748d91f39283d8013150a3b6e3a2b8753807451b1f6dd0c42b70db7fa673c873632f27e1230faf6
-
Filesize
1KB
MD524997f741403795f40411817b1014265
SHA1c80cd75778518b9618f6d24ba5929dd69c192372
SHA256efa79eaf32eb1d08a6c6cabeaa74f14c242f43eef221588cc29238491af8fe5e
SHA5121028db902c8d9a88069ae81fc54a561ae75620637b10958e24a0cea12ea33236dfcb90f7f43a5a8aa78c381664115561435a2c16035cadcfcd14c888ef6ad2dd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5012abd1beb7391fffba9abc5a0832234
SHA15a440af568f0268a5e4876c507a0e6544763f5af
SHA2568930e7a930e4297e6f475dd2b8dd314bec876d8e7d87f4e3e2e0a5e3f469bdd6
SHA51298d04cb38cf5a123f0b4ec794fa0280ded646e7ff89bdd646eb3dfb70252b311be42ba1de470b5a52a3f07225a105ddd8bcb29374e06a3b1c60b56faf001e454
-
Filesize
12KB
MD5eb138804740952e336d54af6f8526ce9
SHA1649ed803e37b119d361abaf072b6e4c644132d64
SHA2563cb511f3ab6a28745835101caf7ec59d2c63a687e29d70d891eda8bd27e561b7
SHA512cda25afdf389854a9b52e89d7f0bfd2142b8110e4ebcf2e39ec9b9f72d161ae28b851d201fbab93870625e6ff5d1242113de60331d68131d89957136499101b1
-
Filesize
12KB
MD5ce28ad8d2e78fdce061aad60c5227967
SHA13d089138c87c8076cd1b21e968222a16e3488bd0
SHA256839a1758d4e9a65aa4eff4b304a1c6a25afad529b09618680bc6e5f9fb68dacd
SHA5126441dffe98c463c2c692a6180d22c7d29d548525011e6b37d03baafc781c7248666ba2ad297120a362fb65b6e20d7cb66c889970287c076ebab5bf084fe283de
-
Filesize
12KB
MD54ad399df471bd65867f7a2072a4c3401
SHA12e567a5cceb6ed01ec7429e2a4860f256cef5ff3
SHA256d56956daf5058a023401909ae48b1ee2323a548087a94bcc3dde2f0395917a26
SHA5124f7f0525c603dd5e5fa74a86ee4e691c6d9c3b6efa8d87f75610f9841487c19c1d5dadfa04acce8e41160846773c4069f7c10de38debe9fa421897513408fc29
-
Filesize
11.9MB
MD57f8fca5c90864895bafce372c6160a12
SHA1ac44483f932c1339ff82877e9709e8e7775ad235
SHA2560c0447bebe01704e8c054105686de35517a7211831878b21728b8a5110ecd784
SHA512ca30d4fa574a5f715745fac229bd0490c16748230e181d8b19755cb47acce0b3acb577854e4067021db0d9f205d616a56cc3bf818e1176b62cd91f3b528d10df