Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2024 10:10
Static task
static1
Behavioral task
behavioral1
Sample
126c0f9959aa4a01bb5e8254b72b4bac370a12cddded7d815ea09b0894f1ee59.exe
Resource
win10v2004-20240226-en
General
-
Target
126c0f9959aa4a01bb5e8254b72b4bac370a12cddded7d815ea09b0894f1ee59.exe
-
Size
1.5MB
-
MD5
f536f5df19df0a0530af2b54bf26a147
-
SHA1
a25e39e1f67cc7a78c201182af75e04038e25240
-
SHA256
126c0f9959aa4a01bb5e8254b72b4bac370a12cddded7d815ea09b0894f1ee59
-
SHA512
e328d25a7480353a09a6ad06b6c05725f52f9f45a9b14b8b3b221f17cc72ddcf0baa29731698376a8f9c0710246c21f6cccc5f58e3adda87c73f702c78fa271e
-
SSDEEP
24576:zyZiQsZhOKz9F5E4HyyRyDDGk05C8XRVrT6JLUq54o0b4+U2TjfbbrSKC3:GIJcaF5hHy8y30BhT6uS4o0b1jzbuK
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
homed
109.107.182.133:19084
Extracted
amadey
3.89
http://77.91.124.1
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
-
url_paths
/theme/index.php
Signatures
-
Detect Mystic stealer payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2kR0881.exe mystic_family -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3512-51-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
explothe.exe6ce5yB7.exe5rN5VI7.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation 6ce5yB7.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation 5rN5VI7.exe -
Executes dropped EXE 14 IoCs
Processes:
Tp3hv20.exejX0tp17.exeTK4EQ53.exebW9hd36.exe1dT17EK1.exe2kR0881.exe3LB97iV.exe4hW731MW.exe5rN5VI7.exeexplothe.exe6ce5yB7.exeexplothe.exeexplothe.exeexplothe.exepid process 4388 Tp3hv20.exe 1476 jX0tp17.exe 4128 TK4EQ53.exe 4996 bW9hd36.exe 3188 1dT17EK1.exe 1180 2kR0881.exe 3424 3LB97iV.exe 1684 4hW731MW.exe 2404 5rN5VI7.exe 5024 explothe.exe 3240 6ce5yB7.exe 1544 explothe.exe 1744 explothe.exe 2140 explothe.exe -
Processes:
resource yara_rule behavioral1/memory/3240-70-0x0000000000400000-0x000000000041E000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6ce5yB7.exe upx behavioral1/memory/3240-83-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
jX0tp17.exeTK4EQ53.exebW9hd36.exe126c0f9959aa4a01bb5e8254b72b4bac370a12cddded7d815ea09b0894f1ee59.exeTp3hv20.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" jX0tp17.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" TK4EQ53.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" bW9hd36.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 126c0f9959aa4a01bb5e8254b72b4bac370a12cddded7d815ea09b0894f1ee59.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Tp3hv20.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
1dT17EK1.exe4hW731MW.exedescription pid process target process PID 3188 set thread context of 5040 3188 1dT17EK1.exe AppLaunch.exe PID 1684 set thread context of 3512 1684 4hW731MW.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
3LB97iV.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3LB97iV.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3LB97iV.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3LB97iV.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1904519900-954640453-4250331663-1000\{1E784ABE-789B-4213-A1D6-14A8902C81F4} msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
3LB97iV.exeAppLaunch.exepid process 3424 3LB97iV.exe 3424 3LB97iV.exe 5040 AppLaunch.exe 5040 AppLaunch.exe 5040 AppLaunch.exe 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
3LB97iV.exepid process 3424 3LB97iV.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 5040 AppLaunch.exe Token: SeShutdownPrivilege 3412 Token: SeCreatePagefilePrivilege 3412 Token: SeShutdownPrivilege 3412 Token: SeCreatePagefilePrivilege 3412 Token: SeShutdownPrivilege 3412 Token: SeCreatePagefilePrivilege 3412 Token: SeShutdownPrivilege 3412 Token: SeCreatePagefilePrivilege 3412 Token: SeShutdownPrivilege 3412 Token: SeCreatePagefilePrivilege 3412 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3412 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
126c0f9959aa4a01bb5e8254b72b4bac370a12cddded7d815ea09b0894f1ee59.exeTp3hv20.exejX0tp17.exeTK4EQ53.exebW9hd36.exe1dT17EK1.exe4hW731MW.exe5rN5VI7.exeexplothe.exe6ce5yB7.execmd.exedescription pid process target process PID 2044 wrote to memory of 4388 2044 126c0f9959aa4a01bb5e8254b72b4bac370a12cddded7d815ea09b0894f1ee59.exe Tp3hv20.exe PID 2044 wrote to memory of 4388 2044 126c0f9959aa4a01bb5e8254b72b4bac370a12cddded7d815ea09b0894f1ee59.exe Tp3hv20.exe PID 2044 wrote to memory of 4388 2044 126c0f9959aa4a01bb5e8254b72b4bac370a12cddded7d815ea09b0894f1ee59.exe Tp3hv20.exe PID 4388 wrote to memory of 1476 4388 Tp3hv20.exe jX0tp17.exe PID 4388 wrote to memory of 1476 4388 Tp3hv20.exe jX0tp17.exe PID 4388 wrote to memory of 1476 4388 Tp3hv20.exe jX0tp17.exe PID 1476 wrote to memory of 4128 1476 jX0tp17.exe TK4EQ53.exe PID 1476 wrote to memory of 4128 1476 jX0tp17.exe TK4EQ53.exe PID 1476 wrote to memory of 4128 1476 jX0tp17.exe TK4EQ53.exe PID 4128 wrote to memory of 4996 4128 TK4EQ53.exe bW9hd36.exe PID 4128 wrote to memory of 4996 4128 TK4EQ53.exe bW9hd36.exe PID 4128 wrote to memory of 4996 4128 TK4EQ53.exe bW9hd36.exe PID 4996 wrote to memory of 3188 4996 bW9hd36.exe 1dT17EK1.exe PID 4996 wrote to memory of 3188 4996 bW9hd36.exe 1dT17EK1.exe PID 4996 wrote to memory of 3188 4996 bW9hd36.exe 1dT17EK1.exe PID 3188 wrote to memory of 5040 3188 1dT17EK1.exe AppLaunch.exe PID 3188 wrote to memory of 5040 3188 1dT17EK1.exe AppLaunch.exe PID 3188 wrote to memory of 5040 3188 1dT17EK1.exe AppLaunch.exe PID 3188 wrote to memory of 5040 3188 1dT17EK1.exe AppLaunch.exe PID 3188 wrote to memory of 5040 3188 1dT17EK1.exe AppLaunch.exe PID 3188 wrote to memory of 5040 3188 1dT17EK1.exe AppLaunch.exe PID 3188 wrote to memory of 5040 3188 1dT17EK1.exe AppLaunch.exe PID 3188 wrote to memory of 5040 3188 1dT17EK1.exe AppLaunch.exe PID 4996 wrote to memory of 1180 4996 bW9hd36.exe 2kR0881.exe PID 4996 wrote to memory of 1180 4996 bW9hd36.exe 2kR0881.exe PID 4996 wrote to memory of 1180 4996 bW9hd36.exe 2kR0881.exe PID 4128 wrote to memory of 3424 4128 TK4EQ53.exe 3LB97iV.exe PID 4128 wrote to memory of 3424 4128 TK4EQ53.exe 3LB97iV.exe PID 4128 wrote to memory of 3424 4128 TK4EQ53.exe 3LB97iV.exe PID 1476 wrote to memory of 1684 1476 jX0tp17.exe 4hW731MW.exe PID 1476 wrote to memory of 1684 1476 jX0tp17.exe 4hW731MW.exe PID 1476 wrote to memory of 1684 1476 jX0tp17.exe 4hW731MW.exe PID 1684 wrote to memory of 3512 1684 4hW731MW.exe AppLaunch.exe PID 1684 wrote to memory of 3512 1684 4hW731MW.exe AppLaunch.exe PID 1684 wrote to memory of 3512 1684 4hW731MW.exe AppLaunch.exe PID 1684 wrote to memory of 3512 1684 4hW731MW.exe AppLaunch.exe PID 1684 wrote to memory of 3512 1684 4hW731MW.exe AppLaunch.exe PID 1684 wrote to memory of 3512 1684 4hW731MW.exe AppLaunch.exe PID 1684 wrote to memory of 3512 1684 4hW731MW.exe AppLaunch.exe PID 1684 wrote to memory of 3512 1684 4hW731MW.exe AppLaunch.exe PID 4388 wrote to memory of 2404 4388 Tp3hv20.exe 5rN5VI7.exe PID 4388 wrote to memory of 2404 4388 Tp3hv20.exe 5rN5VI7.exe PID 4388 wrote to memory of 2404 4388 Tp3hv20.exe 5rN5VI7.exe PID 2404 wrote to memory of 5024 2404 5rN5VI7.exe explothe.exe PID 2404 wrote to memory of 5024 2404 5rN5VI7.exe explothe.exe PID 2404 wrote to memory of 5024 2404 5rN5VI7.exe explothe.exe PID 2044 wrote to memory of 3240 2044 126c0f9959aa4a01bb5e8254b72b4bac370a12cddded7d815ea09b0894f1ee59.exe 6ce5yB7.exe PID 2044 wrote to memory of 3240 2044 126c0f9959aa4a01bb5e8254b72b4bac370a12cddded7d815ea09b0894f1ee59.exe 6ce5yB7.exe PID 2044 wrote to memory of 3240 2044 126c0f9959aa4a01bb5e8254b72b4bac370a12cddded7d815ea09b0894f1ee59.exe 6ce5yB7.exe PID 5024 wrote to memory of 4516 5024 explothe.exe schtasks.exe PID 5024 wrote to memory of 4516 5024 explothe.exe schtasks.exe PID 5024 wrote to memory of 4516 5024 explothe.exe schtasks.exe PID 5024 wrote to memory of 972 5024 explothe.exe cmd.exe PID 5024 wrote to memory of 972 5024 explothe.exe cmd.exe PID 5024 wrote to memory of 972 5024 explothe.exe cmd.exe PID 3240 wrote to memory of 4664 3240 6ce5yB7.exe cmd.exe PID 3240 wrote to memory of 4664 3240 6ce5yB7.exe cmd.exe PID 972 wrote to memory of 2668 972 cmd.exe cmd.exe PID 972 wrote to memory of 2668 972 cmd.exe cmd.exe PID 972 wrote to memory of 2668 972 cmd.exe cmd.exe PID 972 wrote to memory of 1500 972 cmd.exe cacls.exe PID 972 wrote to memory of 1500 972 cmd.exe cacls.exe PID 972 wrote to memory of 1500 972 cmd.exe cacls.exe PID 972 wrote to memory of 1068 972 cmd.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\126c0f9959aa4a01bb5e8254b72b4bac370a12cddded7d815ea09b0894f1ee59.exe"C:\Users\Admin\AppData\Local\Temp\126c0f9959aa4a01bb5e8254b72b4bac370a12cddded7d815ea09b0894f1ee59.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tp3hv20.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tp3hv20.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jX0tp17.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jX0tp17.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\TK4EQ53.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\TK4EQ53.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bW9hd36.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bW9hd36.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1dT17EK1.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1dT17EK1.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2kR0881.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2kR0881.exe6⤵
- Executes dropped EXE
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3LB97iV.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3LB97iV.exe5⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4hW731MW.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4hW731MW.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5rN5VI7.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5rN5VI7.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F5⤵
- Creates scheduled task(s)
PID:4516 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2668
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"6⤵PID:1500
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E6⤵PID:1068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1252
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"6⤵PID:3644
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E6⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6ce5yB7.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6ce5yB7.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\A6B0.tmp\A6B1.tmp\A6B2.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6ce5yB7.exe"3⤵PID:4664
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login4⤵PID:404
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/4⤵PID:3784
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/4⤵PID:1800
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=5064 --field-trial-handle=2232,i,11267738607351977302,107266978269557304,262144 --variations-seed-version /prefetch:11⤵PID:2112
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=3764 --field-trial-handle=2232,i,11267738607351977302,107266978269557304,262144 --variations-seed-version /prefetch:11⤵PID:1684
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4400 --field-trial-handle=2232,i,11267738607351977302,107266978269557304,262144 --variations-seed-version /prefetch:81⤵PID:3696
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=5228 --field-trial-handle=2232,i,11267738607351977302,107266978269557304,262144 --variations-seed-version /prefetch:11⤵PID:1464
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --mojo-platform-channel-handle=5788 --field-trial-handle=2232,i,11267738607351977302,107266978269557304,262144 --variations-seed-version /prefetch:11⤵PID:1068
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --mojo-platform-channel-handle=5968 --field-trial-handle=2232,i,11267738607351977302,107266978269557304,262144 --variations-seed-version /prefetch:11⤵PID:3400
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --mojo-platform-channel-handle=6244 --field-trial-handle=2232,i,11267738607351977302,107266978269557304,262144 --variations-seed-version /prefetch:81⤵PID:1904
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=6400 --field-trial-handle=2232,i,11267738607351977302,107266978269557304,262144 --variations-seed-version /prefetch:81⤵
- Modifies registry class
PID:400
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6468 --field-trial-handle=2232,i,11267738607351977302,107266978269557304,262144 --variations-seed-version /prefetch:81⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:1544
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6664 --field-trial-handle=2232,i,11267738607351977302,107266978269557304,262144 --variations-seed-version /prefetch:81⤵PID:1220
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=5472 --field-trial-handle=2232,i,11267738607351977302,107266978269557304,262144 --variations-seed-version /prefetch:81⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:1744
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:2140
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124B
MD5dec89e5682445d71376896eac0d62d8b
SHA1c5ae3197d3c2faf3dea137719c804ab215022ea6
SHA256c3dea90ca98985007f0de66bf0197fdcd2d4a35e365135bf37a18a4895d81668
SHA512b746b79120d2ff8a9f3327b0bed99c70339155ea831c1eb9f412056fc8de36a0e3005378ba9102bd25ce6cc24fe1171f1a9c8453f33a9bcd6dd59e9ad0f8e186
-
Filesize
45KB
MD53e38f91c02bd4a5f98bbe6efc3ef35f8
SHA1679a1bb487124ac3dc28225cf01ef610e3ddacfa
SHA256e77b730653b15e8ea4b80cc9e6de57dc439ef24339b609d8a53a2250261316ea
SHA5127465795df7cee7e1b25b86554828e242aa37b8a701023100ca3f816d03681efac5c822337a8a806870e5792bdd0cbd963773f100b26c487a2222bf5f6e0dfd61
-
Filesize
1.4MB
MD551893aae83e7b449a777588d4e0b49a8
SHA1ae8ab728530d441b88c51615ad6d05800e95d0c7
SHA256f4e017e921bb578e91564690f944a16cb14fc9d072569d3cb2db620c9cdb7fa5
SHA5127220b1cc4e9d0f4b5a5771b37ade8a12d1f72e4ab1598822a7ce84ad4f22298280929531919d2d199624980db586e1f2f301f76d9b59188f94ce49ae21f950ef
-
Filesize
219KB
MD5fb6fee852f05047499d44ecca38f7da3
SHA17a29f77681f20503edf257162b17811f2f284eb9
SHA2560143e6e36b46db40021876954cbc437032b1d8ec65165d7192ffc61c1b179aa3
SHA512e202a50950318e024aabffe75e23e17910bbbb1d2a6f0c1f24a0cc47f429c964ebee27b04b593a4e7a9757c9243707f89c0bbd410169a0ec94ab644fe34c9dd9
-
Filesize
1.2MB
MD504df542f740e88a0b033635861ee052e
SHA1bb3d2ac0c471ce7cce69c5f4733ef273763d8c8f
SHA256bcc35602c33611a0d1612c67aa7dd9f6b3c9548227339de9280b64f7f3e4c125
SHA512586a6d881f0ae59151c0666e3097a89823d9a6be4372846a16a03f4b18dfd95a45bd3201bb7ddc929b9a70b13b7f08fb51cf3e01188b11192453c011bcac6dd1
-
Filesize
1.9MB
MD5c6da3e5993eb748c7de3dbb0b225b8ce
SHA191d628037f19c18f4cd41b29ac9528f1bdaae0a6
SHA256b8267f87cfcfa0d771062ae010c6e95ae9e80ae5a30b2c7c44207dad23a7f97c
SHA5126dd67d929fb9c7f04f62f1fb135c787e349350dbd37eff7dd5eeaeb57fe08801b477fdb05cf407f34e8495603f4c0b238ed10e3db178849f42501db2b0b6552b
-
Filesize
697KB
MD5b7009df36ca1d3847a9f763acf150207
SHA17abb49f055d9b6e7e5825ab1f8b741a2fb6abd3d
SHA2560363fee1ea81bba95e30bfc22201e4eb83b9020c93d42c5615b168fc730bd11a
SHA512c2cd65e2ac2a8064aea6198260724aa86c54f48e2c81f316b24ac0795f2c652a05caef1bee28b5f173d0503a15ef54d397e16428a22f1a61987e29cad60b2bab
-
Filesize
30KB
MD5d660f75ea496e6eeb62be6cd9b9513dd
SHA1ca4a509446539cb5b8568c89234259d26ee0728e
SHA256b4fd13320de3942eb9af0414fde360b9debd49152620d114f8007f1564e8953f
SHA512fda8b07bcec1f6669c3fbb02f7e767825ab6b7214c485ac817497a4b8cd16baa60c11692f3a239887c9d83ec4207a2b0f2a45b2c20c868372c1bfbb4ed6330aa
-
Filesize
572KB
MD52fdc25a33f8abb0e2e7da98826e6c65c
SHA15a005d51033f772125b9f80a0a0c3954590fc68c
SHA256698c2b4af9268c74c1a35a1017c4866ae3ad9ee5497dd3780101aec8696787c9
SHA51220eceeb1e2643441a3f7f4737bb76aba7e9acf5ebb710f4f75a8863dc1b4e6e947769716586a8292f0496a0d8fcff89853490514fe539bc6e35f27cb8ee91c81
-
Filesize
1.6MB
MD51a426cb8f9ac97c1bea72cab4f1c2546
SHA132e7fa3372dc121c27e1f66c3ef1122af1ceb3d6
SHA2562852e1a8a77e92bf2f3f79c01f4b61c75e5b62f9d9a2da9d76011b9727092b6d
SHA512059cf67e3e5f2dd1fcd0b6c9b0cb36421febc8364c107ae2bbbb0d3539ebb0ab042a2ba8f206aeede561c1eab387ae467a49dfeb2ce22854e38a090b9df7bf0b
-
Filesize
180KB
MD529a80914bcaa0ed3b0ecfdab05c3d142
SHA1ca2c5f72d2f854c97260780bf55322b418d30fd3
SHA25698ab57ac192335e03016f40e6d1fd05f267fec8c15840ae64ca0ebee2bd10807
SHA5123a2b42e469f6dddb2bc88cc7d370d0a1192a64deadd340505868cb8d5db6ccfd7d5df40b2640f6bbe417ef42ab490070372e3195e6e1b62d94ae8f2458afb895
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5