Analysis
-
max time kernel
128s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2024 10:10
Static task
static1
Behavioral task
behavioral1
Sample
2f831cc2089b767cfca2c178440b3080412146a7509b45c937654105d0043056.exe
Resource
win10v2004-20240226-en
General
-
Target
2f831cc2089b767cfca2c178440b3080412146a7509b45c937654105d0043056.exe
-
Size
1.2MB
-
MD5
c12d133679d23b8140a252b1e7a808d2
-
SHA1
5ea0e77daa476f58fc3a568112615fc6782758d3
-
SHA256
2f831cc2089b767cfca2c178440b3080412146a7509b45c937654105d0043056
-
SHA512
e25e92df78309fb1c348a9de5bbead54bf3828a9f5466d1e5751d4188c50624ece31b4c1e00c5df2a09a742466d5dd3ec8537c7c9674e20edb7952063c11cc25
-
SSDEEP
24576:tyNwo5Daz1zj7bxni+qI6eLPc9ADDe6e0lPHuCiVyvjf+VsWydYDN3cc/:INw11Dbh9qIXQ9AHTekOs4fydYh33
Malware Config
Extracted
redline
breha
77.91.124.55:19071
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral1/files/0x0007000000023247-32.dat mystic_family -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/1288-41-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation 5nq9go9.exe -
Executes dropped EXE 8 IoCs
pid Process 4084 bu9nO17.exe 3852 EK2zl39.exe 224 zc3MU55.exe 4596 1Mr90Yw9.exe 2020 2eJ7123.exe 3712 3uS06Ne.exe 5100 4MZ009Kg.exe 2704 5nq9go9.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2f831cc2089b767cfca2c178440b3080412146a7509b45c937654105d0043056.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" bu9nO17.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" EK2zl39.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" zc3MU55.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4596 set thread context of 1856 4596 1Mr90Yw9.exe 92 PID 3712 set thread context of 2948 3712 3uS06Ne.exe 99 PID 5100 set thread context of 1288 5100 4MZ009Kg.exe 108 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 3872 4596 WerFault.exe 90 2360 3712 WerFault.exe 97 888 5100 WerFault.exe 102 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2948 AppLaunch.exe 2948 AppLaunch.exe 1856 AppLaunch.exe 1856 AppLaunch.exe 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3032 msedge.exe 3032 msedge.exe 2976 msedge.exe 2976 msedge.exe 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 4296 msedge.exe 4296 msedge.exe 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2948 AppLaunch.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 1856 AppLaunch.exe Token: SeShutdownPrivilege 3468 Process not Found Token: SeCreatePagefilePrivilege 3468 Process not Found Token: SeShutdownPrivilege 3468 Process not Found Token: SeCreatePagefilePrivilege 3468 Process not Found Token: SeShutdownPrivilege 3468 Process not Found Token: SeCreatePagefilePrivilege 3468 Process not Found Token: SeShutdownPrivilege 3468 Process not Found Token: SeCreatePagefilePrivilege 3468 Process not Found Token: SeShutdownPrivilege 3468 Process not Found Token: SeCreatePagefilePrivilege 3468 Process not Found -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3468 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3156 wrote to memory of 4084 3156 2f831cc2089b767cfca2c178440b3080412146a7509b45c937654105d0043056.exe 86 PID 3156 wrote to memory of 4084 3156 2f831cc2089b767cfca2c178440b3080412146a7509b45c937654105d0043056.exe 86 PID 3156 wrote to memory of 4084 3156 2f831cc2089b767cfca2c178440b3080412146a7509b45c937654105d0043056.exe 86 PID 4084 wrote to memory of 3852 4084 bu9nO17.exe 87 PID 4084 wrote to memory of 3852 4084 bu9nO17.exe 87 PID 4084 wrote to memory of 3852 4084 bu9nO17.exe 87 PID 3852 wrote to memory of 224 3852 EK2zl39.exe 89 PID 3852 wrote to memory of 224 3852 EK2zl39.exe 89 PID 3852 wrote to memory of 224 3852 EK2zl39.exe 89 PID 224 wrote to memory of 4596 224 zc3MU55.exe 90 PID 224 wrote to memory of 4596 224 zc3MU55.exe 90 PID 224 wrote to memory of 4596 224 zc3MU55.exe 90 PID 4596 wrote to memory of 1856 4596 1Mr90Yw9.exe 92 PID 4596 wrote to memory of 1856 4596 1Mr90Yw9.exe 92 PID 4596 wrote to memory of 1856 4596 1Mr90Yw9.exe 92 PID 4596 wrote to memory of 1856 4596 1Mr90Yw9.exe 92 PID 4596 wrote to memory of 1856 4596 1Mr90Yw9.exe 92 PID 4596 wrote to memory of 1856 4596 1Mr90Yw9.exe 92 PID 4596 wrote to memory of 1856 4596 1Mr90Yw9.exe 92 PID 4596 wrote to memory of 1856 4596 1Mr90Yw9.exe 92 PID 224 wrote to memory of 2020 224 zc3MU55.exe 96 PID 224 wrote to memory of 2020 224 zc3MU55.exe 96 PID 224 wrote to memory of 2020 224 zc3MU55.exe 96 PID 3852 wrote to memory of 3712 3852 EK2zl39.exe 97 PID 3852 wrote to memory of 3712 3852 EK2zl39.exe 97 PID 3852 wrote to memory of 3712 3852 EK2zl39.exe 97 PID 3712 wrote to memory of 2948 3712 3uS06Ne.exe 99 PID 3712 wrote to memory of 2948 3712 3uS06Ne.exe 99 PID 3712 wrote to memory of 2948 3712 3uS06Ne.exe 99 PID 3712 wrote to memory of 2948 3712 3uS06Ne.exe 99 PID 3712 wrote to memory of 2948 3712 3uS06Ne.exe 99 PID 3712 wrote to memory of 2948 3712 3uS06Ne.exe 99 PID 4084 wrote to memory of 5100 4084 bu9nO17.exe 102 PID 4084 wrote to memory of 5100 4084 bu9nO17.exe 102 PID 4084 wrote to memory of 5100 4084 bu9nO17.exe 102 PID 5100 wrote to memory of 1288 5100 4MZ009Kg.exe 108 PID 5100 wrote to memory of 1288 5100 4MZ009Kg.exe 108 PID 5100 wrote to memory of 1288 5100 4MZ009Kg.exe 108 PID 5100 wrote to memory of 1288 5100 4MZ009Kg.exe 108 PID 5100 wrote to memory of 1288 5100 4MZ009Kg.exe 108 PID 5100 wrote to memory of 1288 5100 4MZ009Kg.exe 108 PID 5100 wrote to memory of 1288 5100 4MZ009Kg.exe 108 PID 5100 wrote to memory of 1288 5100 4MZ009Kg.exe 108 PID 3156 wrote to memory of 2704 3156 2f831cc2089b767cfca2c178440b3080412146a7509b45c937654105d0043056.exe 111 PID 3156 wrote to memory of 2704 3156 2f831cc2089b767cfca2c178440b3080412146a7509b45c937654105d0043056.exe 111 PID 3156 wrote to memory of 2704 3156 2f831cc2089b767cfca2c178440b3080412146a7509b45c937654105d0043056.exe 111 PID 2704 wrote to memory of 4444 2704 5nq9go9.exe 112 PID 2704 wrote to memory of 4444 2704 5nq9go9.exe 112 PID 4444 wrote to memory of 4296 4444 cmd.exe 115 PID 4444 wrote to memory of 4296 4444 cmd.exe 115 PID 4296 wrote to memory of 848 4296 msedge.exe 116 PID 4296 wrote to memory of 848 4296 msedge.exe 116 PID 4444 wrote to memory of 5080 4444 cmd.exe 117 PID 4444 wrote to memory of 5080 4444 cmd.exe 117 PID 5080 wrote to memory of 4528 5080 msedge.exe 118 PID 5080 wrote to memory of 4528 5080 msedge.exe 118 PID 5080 wrote to memory of 3704 5080 msedge.exe 119 PID 5080 wrote to memory of 3704 5080 msedge.exe 119 PID 5080 wrote to memory of 3704 5080 msedge.exe 119 PID 5080 wrote to memory of 3704 5080 msedge.exe 119 PID 5080 wrote to memory of 3704 5080 msedge.exe 119 PID 5080 wrote to memory of 3704 5080 msedge.exe 119 PID 5080 wrote to memory of 3704 5080 msedge.exe 119 PID 5080 wrote to memory of 3704 5080 msedge.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f831cc2089b767cfca2c178440b3080412146a7509b45c937654105d0043056.exe"C:\Users\Admin\AppData\Local\Temp\2f831cc2089b767cfca2c178440b3080412146a7509b45c937654105d0043056.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bu9nO17.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bu9nO17.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\EK2zl39.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\EK2zl39.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zc3MU55.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zc3MU55.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Mr90Yw9.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Mr90Yw9.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 5886⤵
- Program crash
PID:3872
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2eJ7123.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2eJ7123.exe5⤵
- Executes dropped EXE
PID:2020
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3uS06Ne.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3uS06Ne.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3712 -s 1365⤵
- Program crash
PID:2360
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4MZ009Kg.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4MZ009Kg.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:1288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5100 -s 1364⤵
- Program crash
PID:888
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5nq9go9.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5nq9go9.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\730D.tmp\730E.tmp\730F.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5nq9go9.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffb408546f8,0x7ffb40854708,0x7ffb408547185⤵PID:848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,11003194957286800009,468908655315010292,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:25⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,11003194957286800009,468908655315010292,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,11003194957286800009,468908655315010292,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:85⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11003194957286800009,468908655315010292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:15⤵PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11003194957286800009,468908655315010292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:15⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11003194957286800009,468908655315010292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3896 /prefetch:15⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,11003194957286800009,468908655315010292,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:85⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,11003194957286800009,468908655315010292,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:85⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11003194957286800009,468908655315010292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:15⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11003194957286800009,468908655315010292,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:15⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11003194957286800009,468908655315010292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3928 /prefetch:15⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11003194957286800009,468908655315010292,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:15⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,11003194957286800009,468908655315010292,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4908 /prefetch:25⤵PID:1536
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login4⤵
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffb408546f8,0x7ffb40854708,0x7ffb408547185⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1956,13609861849734793661,7352422180440868595,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1964 /prefetch:25⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1956,13609861849734793661,7352422180440868595,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2488 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2976
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4596 -ip 45961⤵PID:1404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3712 -ip 37121⤵PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 5100 -ip 51001⤵PID:3064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3336
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2980
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize960B
MD583a26bac03146b6559b26e6fbce3f66b
SHA1550d10ba05b59f6bfcd2337de93085b19c4c80de
SHA256d2ee85d1e050decfbe76787f3f59452f5695a3b7ac9a8d3128da6bbd0e2d2d3d
SHA512f6cbaee0ec3142d74f9cbc3b08d09a200541beb114b63f6691b8983ac25fa174447050480fbd85dbab6032fd3e60eb97f18e66b986925b463ea1061f44a10849
-
Filesize
1KB
MD5a7d7a9cdb3dd5281ca454a384a0f80d4
SHA1a6b32ceb2ead8fdede063fcb8e95d409c6820ddf
SHA256dc56c1fa6b3872697d95437894b9d31574dbc7db3bd6355b015e13b57ee296d2
SHA512a4cf569ca532914fe4d111b22f10bc572c8cd36a67a3f9723cc53097e7768bfb4390044ca1a4a72a0ee599b01dd1ccba23c6e49afeb2d4f6dfb01db96de6a2ad
-
Filesize
1KB
MD556219f641c202ed50fa161b2103c15f0
SHA1a11be60e0629a347061848551531e81836d846bf
SHA256a5d39e09cd8bb2ba498d708d16e6373a0bd6766a0b2e571f80a2c40ca9eaa6eb
SHA512b977af2d34dfc69a0c8484b22abf3487f9a7544340da48aa650cef20e9407891e1ca93af6a5206222036e2f1c74e0459d420b99ac2abdb15a63283ca36b0078d
-
Filesize
7KB
MD5a50a755b112008336e5e1498399530c3
SHA1cc151286fbebfb91e6358871e919f3b9c07a8b2a
SHA2563d425a8d9541e65ae62320aba019220be574631c6a988587cad2e5787cb838d1
SHA512c388cb04117b586faeebf29e97b3fcf15a05d1c2789204bdbb1cdd1537ea2403ccc6b84ad51081dfc0364111935ea22a0bbd0bf3e7f3b9e6b036cdf4b7b9b644
-
Filesize
6KB
MD59eef0071c5f4e53537811d796f681613
SHA13f9903838a128f4fba1e2259e43273f96aaeb200
SHA2560f66a6a8b90329c6d83f1cdfd18963def73813f3501348a524ae47ebd9ca48a7
SHA512b9014affcf8f233586c81994a3eb7bb005b395fe2d33c454b38ad84c53bca571bf98868cb6f1f83579b3b045dae144ae739894b44db32a9322eb6dc7f2c71183
-
Filesize
872B
MD51b80b09bb541613ca6460b523ee8e71e
SHA12a37ca6bafdd1213855e28ca8c7ccb74515e2011
SHA256fc3b8b5cb19815e561461cc0be8fc287152c967a0b93ccc7fac1e305213f97c4
SHA51269cccafd15b79d1502be8fa30f11c800d21648f1e28d0eb4ea6c994e66c4e71cecf70c79ccecff5692de61244ef757da2b96ed2745e9a235bd1358271b1bb36e
-
Filesize
872B
MD5a28521e136a2d40263fc6ac7e60cc7e5
SHA1ef5a91e63cc42ade5b2bc3b3a4fbf2b5baadf9d9
SHA256113166b68f1639bc8c3931a52a47a22f651cb0ab05fb7a1083ae5b9025358ccb
SHA512ff0af22063d529fcd2fdd02c8995ad91533e8c7d8b83227a7fd719cebe15db80b5133914b290e40e4ab84df11b441e22b31ade324af882f02a254f5654a51206
-
Filesize
872B
MD56213a90453aced700d2a1cbc79b47607
SHA1fb6898ba3125c276344588cb88bbb71cba8c23ac
SHA256c07b4fdbee128053228fcab031930fc3ebd2cad3321b9e540975f6d45a0e9293
SHA5122e9823c003448f3ec4196739362a6b61fa99ae74d1c9542b6a69b9f40a649eb456286299070e3f920c96d137d0331abca597ad52fca9228591480a3a3454d84f
-
Filesize
872B
MD5b57038926aed512c3c2aba125cc332e9
SHA140ef9d85e14a6690beabd53194c8755257ca6b6f
SHA25648b0f378036f3d7617512a8ee9c2a788119c4285945cb712f4e762670770169f
SHA512cae857da92d238e26e34500846a8acca052a7310964d553614a06611f7d56c54eb6adf51307f1cf46e6b56a15f8c32dd7de0fc9a6e149041bc355b24a09557f2
-
Filesize
872B
MD500e89e03574614fa65e643782e928c7f
SHA18be45b5f04b0ad8bf1bc0cfb238dd968fd7b3cda
SHA256fa79bc7f2bbb1c58138f4371fe58b24c974a8f1515bef49715f814d5dcb30c14
SHA5129edb293f5ced928bf27d3b570166980f95c5bca0a5eca2731c5a5e976b359151af9dfab0e7d0eb97f3397820daa7ef5e9349f68b5222c545c929f08585629f3c
-
Filesize
872B
MD51a47a6ced878a4980daaba2c14ef3ace
SHA1d6412904a73c4f1c01ad0f7576b2222f279d0ba6
SHA256977243cc86ac4bfa7efafcc48e00912d6501a0bdd95c5348b63e4519e9e6c726
SHA512054eedf3b6b7ea49abd854e5c88f7f613f8f044d2140c127497488a31da31402b350b7c6a869f44b8fd988d29217524bdabe03b8f41eae102199c032f2af441a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5cf1ca8e19cb6fe8c543149b0d23b351d
SHA170550184866c26475018100cbd67e17b0cb7ed2a
SHA2569ef8b685670c45fea1dbb135d8ec7fdb3b324073dba0e84491e4795779d37b82
SHA5125ab6db8d4f5503d25c83fdef5eaecd561708b5a7e9ec6680cb22359d1565f86a845d440a7f04d8e016b380f3e8a2d7e22f250816eb5dc91e4c61aee58d23c5d2
-
Filesize
8KB
MD5c6df91a59ef1919902da80ece4c19887
SHA12bfc9f10cfb99c10276b4b42fd4384f596f68fe0
SHA2565fcd513c55c8d85d8faec776d635d34e21222ee77c0721af692976c18a75336d
SHA512b723f2a2fe3492a477e45a9c8f3849feb894c45a42d51edc290079d9b90b4267df37aa3ef782e51412006f0817fd37d409be4e9121608543550d682a9228cb6d
-
Filesize
88B
MD50ec04fde104330459c151848382806e8
SHA13b0b78d467f2db035a03e378f7b3a3823fa3d156
SHA2561ee0a6f7c4006a36891e2fd72a0257e89fd79ad811987c0e17f847fe99ea695f
SHA5128b928989f17f09282e008da27e8b7fd373c99d5cafb85b5f623e02dbb6273f0ed76a9fbbfef0b080dbba53b6de8ee491ea379a38e5b6ca0763b11dd4de544b40
-
Filesize
98KB
MD5ddde959c1561d09de9783cf8820a0c69
SHA10e63838551f17f1325463c2e18fbef3719403069
SHA25637933662117095ad0ad0f602d075ff7f6a12295f6f9962716313b54b2c685e86
SHA5120f8ad551f09db048067494ba42ffd8448bb198e0dcbdc89b18a33bb3b5943bd8c7482612d48e04be7b7d25a383a5b3184fe722ca61e36951235ca1298767fb5e
-
Filesize
1.1MB
MD57ded16b6fa27b2815525197856121fdf
SHA1b6f39dba79a685f2fc69c33b68ca9e5c751d1d3c
SHA256a9e17872c99092e4fa8e3005d5e386c319fc577186097a8e59ef231345fc6d63
SHA51287ed49d475d8e2fd1bdc1c895d0d3c2ec0443e939b1c6f775183563027a0446fc5074b0923579ecf88ee4340995df987363b1b8a42825b235ee1f4553b2ce9fb
-
Filesize
1.1MB
MD5d8d2d7bc90158b714ed58539ad3e338d
SHA1e212339ede6b2d4a54d4258cab0fbd4b62172125
SHA25604b451789fade1c050d6e68eaf6cd03c32b36a22a0fceef914645b94cab6fbb9
SHA51288d060d2cc76aadb08116977d1013a80242f8469fbfef2e57b4257aa24f05ebc364402b60d94c7f8558bec4a42c43aa0bceb7e9c926f13bedfc205304621b9fa
-
Filesize
691KB
MD5b05761f29f976010ad708f34926a0c6f
SHA126f8a773e26a9751c01f353c96221f885e363e3b
SHA2563f50bf8779f44f9741cced2f829b3f37d132390a2056cb65600561fde6823000
SHA512edb0320f381bbe4423c96ff84ba6cc9f226c8e21a0535daca76f635a4c6d2e3f2f66ddbe18af060d18d44e8b752acc630c0126d5d605a2f145882f2d68c4c0a1
-
Filesize
896KB
MD523ce5fc1452b2bf2af5b0065fb851f1a
SHA1d085a1dad9c4ad19d6cc481a623560e93020a0d8
SHA256adb1288e8e7132d0984ef573da165966224635faff6721053d819f93dca59418
SHA51275e627497ce9ef36ad889c531d75faeab9ad96aa194c36b700a6dd630fa0bb6b36131f9ad8965d6455920d1685cc582a9e8c6edcb2557d9f7a9fa798fbc8a096
-
Filesize
330KB
MD50a42ce50a0b0b0b6c97a70d3afc16dc0
SHA1eacff33e87024c78634ebd18167baaf44a69bb6f
SHA256160d52072a8ddeb1ae25c7d82e2af8aeb6a16ed7e0289b0728bf95fc5a9ace57
SHA512798e97cc038533a6364c5b4cbda71f1498c88508648aab5a0321f9b12b2e989ecc4175b466ab330ab59048f757007b3ba75904845c75feec7cf96528260e866a
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
180KB
MD53f305144feb3040cf41b216841537ec2
SHA1ae9066cc3b40be6250e7e6a90bcc2de160067b84
SHA25689fec546032f1fc58fb08e79ab626d7e2401a5958b81a928ab5e0c1540e180b1
SHA512ca3993ad5d0a376809e304a49eaf81c8ba3ecbe40e7085573698b1870291034f9bbfdec552b640b32d92b2f0b359f33c40f694f401abaf81d70ab7a6484a798e