Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2024 10:10
Static task
static1
Behavioral task
behavioral1
Sample
1bb910ccfc726f1c6617c7569e2811a7a372d042b48de2ad0843de01d741c6f0.exe
Resource
win10v2004-20231215-en
General
-
Target
1bb910ccfc726f1c6617c7569e2811a7a372d042b48de2ad0843de01d741c6f0.exe
-
Size
1.4MB
-
MD5
5d78bd8ce2cb424e2fb1d9faf86c293b
-
SHA1
30bf439a716af76f6395c4458e4a9d057a3a8bb0
-
SHA256
1bb910ccfc726f1c6617c7569e2811a7a372d042b48de2ad0843de01d741c6f0
-
SHA512
02e1c2aaa080faf638786ae256714e291fb9fd696b35b0e6a67e4082b2be88f52cc1065b0b88e64d05d55c1305a1e0b2992f582a3cd4ff23c99e0cbee3391ed3
-
SSDEEP
24576:zywTlIF0FA5pNwu10bl7CkjibvYXoxgofHDsYcKAkw8Ygbn16h6S3KL9oEt:GUlIWa0tCYsQ+gofTKkwLs6hJKB
Malware Config
Extracted
mystic
http://5.42.92.211/
Extracted
redline
breha
77.91.124.55:19071
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral1/memory/4204-34-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/4204-37-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/4204-35-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/4204-33-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/1580-46-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 5jU7BV0.exe -
Executes dropped EXE 8 IoCs
pid Process 5020 PJ6XU56.exe 4808 bY5xD89.exe 2244 mS9oL58.exe 516 1ng00Qi4.exe 3584 2hK6103.exe 1472 3yp69xe.exe 4396 4TA835xT.exe 4084 5jU7BV0.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1bb910ccfc726f1c6617c7569e2811a7a372d042b48de2ad0843de01d741c6f0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" PJ6XU56.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" bY5xD89.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" mS9oL58.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 516 set thread context of 4264 516 1ng00Qi4.exe 88 PID 3584 set thread context of 4204 3584 2hK6103.exe 94 PID 1472 set thread context of 1088 1472 3yp69xe.exe 101 PID 4396 set thread context of 1580 4396 4TA835xT.exe 106 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
pid pid_target Process procid_target 1492 516 WerFault.exe 87 3460 4204 WerFault.exe 944 3584 WerFault.exe 92 3732 1472 WerFault.exe 99 3740 4396 WerFault.exe 104 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4264 AppLaunch.exe 4264 AppLaunch.exe 1088 AppLaunch.exe 1088 AppLaunch.exe 4064 msedge.exe 4064 msedge.exe 2628 msedge.exe 2628 msedge.exe 4684 msedge.exe 4684 msedge.exe 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1088 AppLaunch.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4264 AppLaunch.exe Token: SeShutdownPrivilege 3492 Process not Found Token: SeCreatePagefilePrivilege 3492 Process not Found Token: SeShutdownPrivilege 3492 Process not Found Token: SeCreatePagefilePrivilege 3492 Process not Found -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5044 wrote to memory of 5020 5044 1bb910ccfc726f1c6617c7569e2811a7a372d042b48de2ad0843de01d741c6f0.exe 84 PID 5044 wrote to memory of 5020 5044 1bb910ccfc726f1c6617c7569e2811a7a372d042b48de2ad0843de01d741c6f0.exe 84 PID 5044 wrote to memory of 5020 5044 1bb910ccfc726f1c6617c7569e2811a7a372d042b48de2ad0843de01d741c6f0.exe 84 PID 5020 wrote to memory of 4808 5020 PJ6XU56.exe 85 PID 5020 wrote to memory of 4808 5020 PJ6XU56.exe 85 PID 5020 wrote to memory of 4808 5020 PJ6XU56.exe 85 PID 4808 wrote to memory of 2244 4808 bY5xD89.exe 86 PID 4808 wrote to memory of 2244 4808 bY5xD89.exe 86 PID 4808 wrote to memory of 2244 4808 bY5xD89.exe 86 PID 2244 wrote to memory of 516 2244 mS9oL58.exe 87 PID 2244 wrote to memory of 516 2244 mS9oL58.exe 87 PID 2244 wrote to memory of 516 2244 mS9oL58.exe 87 PID 516 wrote to memory of 4264 516 1ng00Qi4.exe 88 PID 516 wrote to memory of 4264 516 1ng00Qi4.exe 88 PID 516 wrote to memory of 4264 516 1ng00Qi4.exe 88 PID 516 wrote to memory of 4264 516 1ng00Qi4.exe 88 PID 516 wrote to memory of 4264 516 1ng00Qi4.exe 88 PID 516 wrote to memory of 4264 516 1ng00Qi4.exe 88 PID 516 wrote to memory of 4264 516 1ng00Qi4.exe 88 PID 516 wrote to memory of 4264 516 1ng00Qi4.exe 88 PID 2244 wrote to memory of 3584 2244 mS9oL58.exe 92 PID 2244 wrote to memory of 3584 2244 mS9oL58.exe 92 PID 2244 wrote to memory of 3584 2244 mS9oL58.exe 92 PID 3584 wrote to memory of 4204 3584 2hK6103.exe 94 PID 3584 wrote to memory of 4204 3584 2hK6103.exe 94 PID 3584 wrote to memory of 4204 3584 2hK6103.exe 94 PID 3584 wrote to memory of 4204 3584 2hK6103.exe 94 PID 3584 wrote to memory of 4204 3584 2hK6103.exe 94 PID 3584 wrote to memory of 4204 3584 2hK6103.exe 94 PID 3584 wrote to memory of 4204 3584 2hK6103.exe 94 PID 3584 wrote to memory of 4204 3584 2hK6103.exe 94 PID 3584 wrote to memory of 4204 3584 2hK6103.exe 94 PID 3584 wrote to memory of 4204 3584 2hK6103.exe 94 PID 4808 wrote to memory of 1472 4808 bY5xD89.exe 99 PID 4808 wrote to memory of 1472 4808 bY5xD89.exe 99 PID 4808 wrote to memory of 1472 4808 bY5xD89.exe 99 PID 1472 wrote to memory of 1088 1472 3yp69xe.exe 101 PID 1472 wrote to memory of 1088 1472 3yp69xe.exe 101 PID 1472 wrote to memory of 1088 1472 3yp69xe.exe 101 PID 1472 wrote to memory of 1088 1472 3yp69xe.exe 101 PID 1472 wrote to memory of 1088 1472 3yp69xe.exe 101 PID 1472 wrote to memory of 1088 1472 3yp69xe.exe 101 PID 5020 wrote to memory of 4396 5020 PJ6XU56.exe 104 PID 5020 wrote to memory of 4396 5020 PJ6XU56.exe 104 PID 5020 wrote to memory of 4396 5020 PJ6XU56.exe 104 PID 4396 wrote to memory of 1580 4396 4TA835xT.exe 106 PID 4396 wrote to memory of 1580 4396 4TA835xT.exe 106 PID 4396 wrote to memory of 1580 4396 4TA835xT.exe 106 PID 4396 wrote to memory of 1580 4396 4TA835xT.exe 106 PID 4396 wrote to memory of 1580 4396 4TA835xT.exe 106 PID 4396 wrote to memory of 1580 4396 4TA835xT.exe 106 PID 4396 wrote to memory of 1580 4396 4TA835xT.exe 106 PID 4396 wrote to memory of 1580 4396 4TA835xT.exe 106 PID 5044 wrote to memory of 4084 5044 1bb910ccfc726f1c6617c7569e2811a7a372d042b48de2ad0843de01d741c6f0.exe 109 PID 5044 wrote to memory of 4084 5044 1bb910ccfc726f1c6617c7569e2811a7a372d042b48de2ad0843de01d741c6f0.exe 109 PID 5044 wrote to memory of 4084 5044 1bb910ccfc726f1c6617c7569e2811a7a372d042b48de2ad0843de01d741c6f0.exe 109 PID 4084 wrote to memory of 2312 4084 5jU7BV0.exe 110 PID 4084 wrote to memory of 2312 4084 5jU7BV0.exe 110 PID 2312 wrote to memory of 3704 2312 cmd.exe 113 PID 2312 wrote to memory of 3704 2312 cmd.exe 113 PID 3704 wrote to memory of 1716 3704 msedge.exe 114 PID 3704 wrote to memory of 1716 3704 msedge.exe 114 PID 2312 wrote to memory of 4684 2312 cmd.exe 115 PID 2312 wrote to memory of 4684 2312 cmd.exe 115 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bb910ccfc726f1c6617c7569e2811a7a372d042b48de2ad0843de01d741c6f0.exe"C:\Users\Admin\AppData\Local\Temp\1bb910ccfc726f1c6617c7569e2811a7a372d042b48de2ad0843de01d741c6f0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PJ6XU56.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PJ6XU56.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bY5xD89.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bY5xD89.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mS9oL58.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mS9oL58.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1ng00Qi4.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1ng00Qi4.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 516 -s 5646⤵
- Program crash
PID:1492
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2hK6103.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2hK6103.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4204 -s 5407⤵
- Program crash
PID:3460
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 1406⤵
- Program crash
PID:944
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3yp69xe.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3yp69xe.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 1365⤵
- Program crash
PID:3732
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4TA835xT.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4TA835xT.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:1580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4396 -s 1524⤵
- Program crash
PID:3740
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5jU7BV0.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5jU7BV0.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7167.tmp\7168.tmp\7169.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5jU7BV0.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/4⤵
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ff9bc3f46f8,0x7ff9bc3f4708,0x7ff9bc3f47185⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,17924667312888476265,8382443575319402579,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1988 /prefetch:25⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,17924667312888476265,8382443575319402579,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2480 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2628
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4684 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ff9bc3f46f8,0x7ff9bc3f4708,0x7ff9bc3f47185⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,7582719917927968699,15918189057578109549,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:25⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,7582719917927968699,15918189057578109549,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,7582719917927968699,15918189057578109549,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2636 /prefetch:85⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7582719917927968699,15918189057578109549,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:15⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7582719917927968699,15918189057578109549,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:15⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7582719917927968699,15918189057578109549,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3892 /prefetch:15⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,7582719917927968699,15918189057578109549,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:85⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,7582719917927968699,15918189057578109549,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:85⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7582719917927968699,15918189057578109549,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:15⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7582719917927968699,15918189057578109549,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:15⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7582719917927968699,15918189057578109549,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:15⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7582719917927968699,15918189057578109549,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:15⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,7582719917927968699,15918189057578109549,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 /prefetch:25⤵PID:4028
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 516 -ip 5161⤵PID:60
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3584 -ip 35841⤵PID:3160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4204 -ip 42041⤵PID:576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1472 -ip 14721⤵PID:1060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4396 -ip 43961⤵PID:4820
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:776
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4516
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50bd5c93de6441cd85df33f5858ead08c
SHA1c9e9a6c225ae958d5725537fac596b4d89ccb621
SHA2566e881c02306f0b1f4d926f77b32c57d4ba98db35a573562a017ae9e357fcb2d2
SHA51219073981f96ba488d87665cfa7ffc126b1b577865f36a53233f15d2773eabe5200a2a64874a3b180913ef95efdece3954169bdcb4232ee793670b100109f6ae2
-
Filesize
152B
MD54d6e17218d9a99976d1a14c6f6944c96
SHA19e54a19d6c61d99ac8759c5f07b2f0d5faab447f
SHA25632e343d2794af8bc6f2f7c905b5df11d53db4ad8922b92ad5e7cc9c856509d93
SHA5123fa166b3e2d1236298d8dda7071a6fcf2bde283f181b8b0a07c0bb8ba756d6f55fa8a847ca5286d4dbabc6dace67e842a118866320ac01bd5f93cccd3a032e47
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize960B
MD5b51c21fad5ede5e5b09f687958739615
SHA1e53f7d2905a5f8c8c1e55d91952fec17430dfe11
SHA25614cb349904f3439a76173e4a020595682feb633278906ec2d3521ef4e1252857
SHA512f4285388c98fa3a521f55f17eff4b12acb3cea369a6300b96b11f87d99fafe66efe3be70b407cac7663d3e439a0edbc9df56fa3966b1451f3160c5f795bb7fe0
-
Filesize
1KB
MD5267827314848603aeb34d6717c563b85
SHA1190b4cd0ae3d892570571a3bb359b7dd2c78f8b6
SHA256056fc47b3eaf50d8bf21eff5e5a32af15944f636871e2d1cf7bed0f454125a68
SHA512906334aabce146f0ace1e28665c2bf8858f0293f492a7b3420b73a13ad492bba4a0e47184b3591154046663bb6998bd0267199f7dcdd65f2427922baf14989a8
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD5ab0d14131bbc8b3132ae869a508b5edc
SHA1162aea8379e227090f988b5fdb63462ad42a7d51
SHA2563fd67e9534265c3a3351dc3fefadc203429545a31ebbb057d8f186bd5489aae9
SHA51297dd952ceefc5ec0fc6f8a4cb41a842e4a62e552e37940008d0f98bb9e9221357e20e890f9551b10155e483bdc0f96e2ee72f751166a5460f13d37c5f56da646
-
Filesize
6KB
MD58d96f364ce431d08c91d673696a7a74d
SHA1492a873d0092f03cc2758a85aa8f13edb32ae9ae
SHA2562c3ec6fa02e8ced2f7a0592e4bc9e4af6debca2f7a76202c02e440027c20a509
SHA512d805db4595f2cae7d3d698eeab5f3df90cbd71a32df7d9d67acadf6e6512dc9c9f2cce798138c7815de35b51338cee29faa8b633dcf72b2a3f97ef96849c3084
-
Filesize
5KB
MD5ef0472cc139908158b92c5ab09e57eb6
SHA11dc532dfd97ae72d666256f1bf8f2eb0482904f3
SHA2563ead2e47fd0149ca73a5b9e65e6c83112be82cbf8e9897b466883c6366c3b354
SHA512a7f90ebc0ca7783989971d30fd19d3d0cab4b47aa8a169d024ff989d7a2cf624325ded129c08be7324fffcd32daf5195c5e1b725def74b731211ce6278adb3e5
-
Filesize
24KB
MD5c2ef1d773c3f6f230cedf469f7e34059
SHA1e410764405adcfead3338c8d0b29371fd1a3f292
SHA256185450d538a894e4dcf55b428f506f3d7baa86664fbbc67afd6c255b65178521
SHA5122ef93803da4d630916bed75d678382fd1c72bff1700a1a72e2612431c6d5e11410ced4eaf522b388028aeadb08e8a77513e16594e6ab081f6d6203e4caa7d549
-
Filesize
872B
MD5497ee036fa0d9724e418d7e78f10a5f9
SHA1f6932369c84dbe2beaa694a6782041b4adc7847f
SHA2568bd4d02f689a04c54918456d7608a18bb2923175f877c8fad4e96d3ac59fb5dc
SHA5129b5ee66340fd45f42984b79149776a62c1debb324746996b7f75623c4e1692d5caaabde3bce5763e01cb3de3156bab9ed427d8af62ab6705899bf88da9ed4739
-
Filesize
872B
MD53aecb8fac6f62220d46d8e5e0a1bc8e1
SHA134f4304a0ecf0290e8ca1def6644f88671f7edc5
SHA256776d15a841fa098f142f21bb31fe04dadd1f375cc5b29791702992289c8279da
SHA512c3799394bdac8e170e5b96fbb4aee8658d891c94c042595ed2f3d0dbf009116622cac2122efa21f50123647fb6551233c6ce1429b97b5f2cb741925e1abc57bf
-
Filesize
872B
MD5a8427cc60b06df2eda1fb83fecda2777
SHA1c2598453ddee88cf71617382343f618c639e2b1a
SHA25683d3f65e6390e507c6c02cd454bb1bd91f256a913241a0978fae9f9f840fd929
SHA51299a3b8909339e5aa1c28f99632a842654bc48c9ae48c5264f0650345b3ff456c4aa95114d88d8a35ded59d9266a226f542e16ad6cad4a5d35274a7879f5233c5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD526bc037bd261455d32d18fd5a1641ba1
SHA14b37c82be937c4eb8e357669bfffc84a42ffddd9
SHA25658e28785034d958a1481c05cfa81a91f6ceae86db7ce2c7c7255bb23443b44fa
SHA512beb5cff2d1a246bf9bd80c7c17b405e28f5c17ca279cdc98cbf58fe53263eb5dadf9f38b97a20178779a7a0f624d71b0c14c57271f3fc32494ebff131a1491c7
-
Filesize
2KB
MD500c835ffbe9323c1f85e703d7c70faa8
SHA117d403188fcc2fabf94f24d69c66699793a91e1e
SHA256225776f8fe4cd863bfa3473eb82a834de1f4d08a2a7ef1026f78da4af0d62418
SHA512e29d1b12756191de8c21a70d2e362bdc5536f55ec70ae5562409a70be663c00242b992d56f22c0c631e44a5b6f7b8eb763ff9d6442eafa2d7458f6c7825726ab
-
Filesize
88B
MD50ec04fde104330459c151848382806e8
SHA13b0b78d467f2db035a03e378f7b3a3823fa3d156
SHA2561ee0a6f7c4006a36891e2fd72a0257e89fd79ad811987c0e17f847fe99ea695f
SHA5128b928989f17f09282e008da27e8b7fd373c99d5cafb85b5f623e02dbb6273f0ed76a9fbbfef0b080dbba53b6de8ee491ea379a38e5b6ca0763b11dd4de544b40
-
Filesize
98KB
MD54d52f45fee084f7839109ad353251518
SHA1145ae51abd651a7dc0d82dc4ec9f94737ab348dc
SHA256eadb574c7103371c2fff91313098575273acd10f680d60d0824b209ec44171cc
SHA5127c26718b74f6a6b4b5476e801112a8d23f1570463f387bcb376757d2ff76fc2066c692e567fd521d98c618a11c1d4db5cd408691925b524ebf85d35f7fed3f29
-
Filesize
1.3MB
MD5352ffaaca7c335b9ce70e92098d68a34
SHA11b9485efaeb772a90ad565367b8bbb9684bb4bc6
SHA256a42b4d97f4e2404775e6f52d1be02388ba680126699b5221c73805df4e8164ee
SHA512e46ec97c8880fded8afc28debab6f46bf84550c53cca95b10df550d81750b51175596d57eb45bbd8af0e3dd6a931fe9da33db1c6eb5de55cfdbf3b0b635c6ab7
-
Filesize
1.1MB
MD55d15b8ea194dd7886ea8f98e6a0fc61e
SHA15983982aa4cbe2cf97c8c22f28ed8ac934e2fd5c
SHA256cea22be3896e8a951a240a44e9423215104c5032039c063d7cdae073f41b2ee4
SHA512d01673d84c0b223d9481e974ca288b2d1a581ec2374cb2d89f1a7b7112a30701444107f37ff16eb3de384c3790b9764a3289ba86711c5abeaf8ae830c37d2afb
-
Filesize
903KB
MD5e19c167e77d3609a28dfe63f4a0e1f9e
SHA143387fa3588b028bd387cc1b0e2a39e9aa6eccb1
SHA256c2aed8edad77fef58811cde3d53d368584d501913ccc38435b510876340e94b7
SHA512602aec6c2caf2f8dadd68049ec7752fb95a928e825c57c3811b73d438f091ecdf2996583bf92f0f82d282198900c7274a286a7db7af52502547b7e557279d621
-
Filesize
909KB
MD572a5a66f018e70f11a8382e7696a5575
SHA14159645621d76212c38d5641bcbecac38138c791
SHA25628427ca43aaf934d30468b1f0d264e8ab820fd6258eb74bee4f9d5a228c25701
SHA51251e492ca427578711bc0a37cdbddf02aff9cec0bdfe939d054417bb9137a715c5c310d5e67b0c722b66cc0c3f4986eddcd9b44ca12754d26c0434ef6c176534a
-
Filesize
535KB
MD5b6ed6f9f2940368e2c355e50be55a071
SHA1a96cb2fadafc9c7ba9f99fdbc5440963be0c1498
SHA2565c73c09925f7bc3b0905849d66342f35465d95b251d9d1f1d1b5fa7ed4749010
SHA512f4f1b0aefc031b84fddc489163711385c3366681b74a0154b69e9d61da03ebe4d1dea9d6575abd263a9e58c442c2c93e9d84ba3992d5c8743f5862aaacd59642
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
1.1MB
MD5b45c9e2647567850c3f48d22d4ab8a35
SHA1b0e4dc1e2eba33d653c828c5cf5f0312ccb7153b
SHA256c56e54ff93bd18e75db7e3947fbde60b9ee8f70b0ea0d79fb8fc63cc10963859
SHA512287b43b02fab6737741091c11622f79289cdedab0748f57e1238b9857e963df7138bed5dd84beac212d7c8c5a38f58225ebd7fdd18f4368fa73071e3677b5bf9