Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2024 10:10
Static task
static1
Behavioral task
behavioral1
Sample
4152cd3aeeebb927e6c14da59f6868d801dc8a30f04f20b25e3e76ed8a7191ae.exe
Resource
win10v2004-20240226-en
General
-
Target
4152cd3aeeebb927e6c14da59f6868d801dc8a30f04f20b25e3e76ed8a7191ae.exe
-
Size
1.4MB
-
MD5
fb5052956af295a212cf88f91cc44135
-
SHA1
577c83e4d4902af1bff1b9a63868da8e1e13233c
-
SHA256
4152cd3aeeebb927e6c14da59f6868d801dc8a30f04f20b25e3e76ed8a7191ae
-
SHA512
488f0b539c2eae9e9fdc306449b9e2be2a6926cdcc156279b703168684f602c549dd6bab3fdcf8d69c706c4cc059537a32bf0311e5ddaa0e1a5f952ef89c7a3f
-
SSDEEP
24576:wyEm0mdTAf+ZFjsO7B4oiQTKsyfovwGfCbnVLJg5pXB/xWyjPiQOxTrpIviBLziI:3E+dTVF4YBnrKxewOCRSyyeJ9dZvdD9E
Malware Config
Extracted
mystic
http://5.42.92.211/
Extracted
redline
breha
77.91.124.55:19071
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral1/memory/3324-37-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/3324-35-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/3324-34-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/3324-33-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/5084-46-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 5gf4Yf7.exe -
Executes dropped EXE 8 IoCs
pid Process 2968 BU7Gr47.exe 1600 vv0ar91.exe 2388 TB6bx89.exe 3348 1Xl15TQ2.exe 1988 2SV2078.exe 2848 3Jd88fi.exe 4308 4of435KW.exe 4628 5gf4Yf7.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vv0ar91.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" TB6bx89.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4152cd3aeeebb927e6c14da59f6868d801dc8a30f04f20b25e3e76ed8a7191ae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" BU7Gr47.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3348 set thread context of 4488 3348 1Xl15TQ2.exe 91 PID 1988 set thread context of 3324 1988 2SV2078.exe 101 PID 2848 set thread context of 724 2848 3Jd88fi.exe 108 PID 4308 set thread context of 5084 4308 4of435KW.exe 113 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
pid pid_target Process procid_target 2292 3348 WerFault.exe 89 3244 1988 WerFault.exe 95 2496 3324 WerFault.exe 3308 2848 WerFault.exe 106 4948 4308 WerFault.exe 111 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4488 AppLaunch.exe 4488 AppLaunch.exe 724 AppLaunch.exe 724 AppLaunch.exe 2720 msedge.exe 2720 msedge.exe 880 msedge.exe 880 msedge.exe 1576 msedge.exe 1576 msedge.exe 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 724 AppLaunch.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4488 AppLaunch.exe Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3444 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4240 wrote to memory of 2968 4240 4152cd3aeeebb927e6c14da59f6868d801dc8a30f04f20b25e3e76ed8a7191ae.exe 84 PID 4240 wrote to memory of 2968 4240 4152cd3aeeebb927e6c14da59f6868d801dc8a30f04f20b25e3e76ed8a7191ae.exe 84 PID 4240 wrote to memory of 2968 4240 4152cd3aeeebb927e6c14da59f6868d801dc8a30f04f20b25e3e76ed8a7191ae.exe 84 PID 2968 wrote to memory of 1600 2968 BU7Gr47.exe 86 PID 2968 wrote to memory of 1600 2968 BU7Gr47.exe 86 PID 2968 wrote to memory of 1600 2968 BU7Gr47.exe 86 PID 1600 wrote to memory of 2388 1600 vv0ar91.exe 87 PID 1600 wrote to memory of 2388 1600 vv0ar91.exe 87 PID 1600 wrote to memory of 2388 1600 vv0ar91.exe 87 PID 2388 wrote to memory of 3348 2388 TB6bx89.exe 89 PID 2388 wrote to memory of 3348 2388 TB6bx89.exe 89 PID 2388 wrote to memory of 3348 2388 TB6bx89.exe 89 PID 3348 wrote to memory of 4488 3348 1Xl15TQ2.exe 91 PID 3348 wrote to memory of 4488 3348 1Xl15TQ2.exe 91 PID 3348 wrote to memory of 4488 3348 1Xl15TQ2.exe 91 PID 3348 wrote to memory of 4488 3348 1Xl15TQ2.exe 91 PID 3348 wrote to memory of 4488 3348 1Xl15TQ2.exe 91 PID 3348 wrote to memory of 4488 3348 1Xl15TQ2.exe 91 PID 3348 wrote to memory of 4488 3348 1Xl15TQ2.exe 91 PID 3348 wrote to memory of 4488 3348 1Xl15TQ2.exe 91 PID 2388 wrote to memory of 1988 2388 TB6bx89.exe 95 PID 2388 wrote to memory of 1988 2388 TB6bx89.exe 95 PID 2388 wrote to memory of 1988 2388 TB6bx89.exe 95 PID 1988 wrote to memory of 3324 1988 2SV2078.exe 101 PID 1988 wrote to memory of 3324 1988 2SV2078.exe 101 PID 1988 wrote to memory of 3324 1988 2SV2078.exe 101 PID 1988 wrote to memory of 3324 1988 2SV2078.exe 101 PID 1988 wrote to memory of 3324 1988 2SV2078.exe 101 PID 1988 wrote to memory of 3324 1988 2SV2078.exe 101 PID 1988 wrote to memory of 3324 1988 2SV2078.exe 101 PID 1988 wrote to memory of 3324 1988 2SV2078.exe 101 PID 1988 wrote to memory of 3324 1988 2SV2078.exe 101 PID 1988 wrote to memory of 3324 1988 2SV2078.exe 101 PID 1600 wrote to memory of 2848 1600 vv0ar91.exe 106 PID 1600 wrote to memory of 2848 1600 vv0ar91.exe 106 PID 1600 wrote to memory of 2848 1600 vv0ar91.exe 106 PID 2848 wrote to memory of 724 2848 3Jd88fi.exe 108 PID 2848 wrote to memory of 724 2848 3Jd88fi.exe 108 PID 2848 wrote to memory of 724 2848 3Jd88fi.exe 108 PID 2848 wrote to memory of 724 2848 3Jd88fi.exe 108 PID 2848 wrote to memory of 724 2848 3Jd88fi.exe 108 PID 2848 wrote to memory of 724 2848 3Jd88fi.exe 108 PID 2968 wrote to memory of 4308 2968 BU7Gr47.exe 111 PID 2968 wrote to memory of 4308 2968 BU7Gr47.exe 111 PID 2968 wrote to memory of 4308 2968 BU7Gr47.exe 111 PID 4308 wrote to memory of 5084 4308 4of435KW.exe 113 PID 4308 wrote to memory of 5084 4308 4of435KW.exe 113 PID 4308 wrote to memory of 5084 4308 4of435KW.exe 113 PID 4308 wrote to memory of 5084 4308 4of435KW.exe 113 PID 4308 wrote to memory of 5084 4308 4of435KW.exe 113 PID 4308 wrote to memory of 5084 4308 4of435KW.exe 113 PID 4308 wrote to memory of 5084 4308 4of435KW.exe 113 PID 4308 wrote to memory of 5084 4308 4of435KW.exe 113 PID 4240 wrote to memory of 4628 4240 4152cd3aeeebb927e6c14da59f6868d801dc8a30f04f20b25e3e76ed8a7191ae.exe 116 PID 4240 wrote to memory of 4628 4240 4152cd3aeeebb927e6c14da59f6868d801dc8a30f04f20b25e3e76ed8a7191ae.exe 116 PID 4240 wrote to memory of 4628 4240 4152cd3aeeebb927e6c14da59f6868d801dc8a30f04f20b25e3e76ed8a7191ae.exe 116 PID 4628 wrote to memory of 4440 4628 5gf4Yf7.exe 117 PID 4628 wrote to memory of 4440 4628 5gf4Yf7.exe 117 PID 4440 wrote to memory of 880 4440 cmd.exe 120 PID 4440 wrote to memory of 880 4440 cmd.exe 120 PID 880 wrote to memory of 2536 880 msedge.exe 121 PID 880 wrote to memory of 2536 880 msedge.exe 121 PID 4440 wrote to memory of 2020 4440 cmd.exe 122 PID 4440 wrote to memory of 2020 4440 cmd.exe 122 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4152cd3aeeebb927e6c14da59f6868d801dc8a30f04f20b25e3e76ed8a7191ae.exe"C:\Users\Admin\AppData\Local\Temp\4152cd3aeeebb927e6c14da59f6868d801dc8a30f04f20b25e3e76ed8a7191ae.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BU7Gr47.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BU7Gr47.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vv0ar91.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vv0ar91.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\TB6bx89.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\TB6bx89.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xl15TQ2.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xl15TQ2.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3348 -s 5646⤵
- Program crash
PID:2292
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2SV2078.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2SV2078.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 5407⤵
- Program crash
PID:2496
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 1366⤵
- Program crash
PID:3244
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3Jd88fi.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3Jd88fi.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 1565⤵
- Program crash
PID:3308
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4of435KW.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4of435KW.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:5084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4308 -s 1364⤵
- Program crash
PID:4948
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5gf4Yf7.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5gf4Yf7.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\566D.tmp\566E.tmp\566F.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5gf4Yf7.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x168,0x16c,0x170,0x144,0x174,0x7ff8bd9f46f8,0x7ff8bd9f4708,0x7ff8bd9f47185⤵PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,4733135922080582677,2806678281770971225,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2000 /prefetch:25⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1988,4733135922080582677,2806678281770971225,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1988,4733135922080582677,2806678281770971225,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:85⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,4733135922080582677,2806678281770971225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:15⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,4733135922080582677,2806678281770971225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:15⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,4733135922080582677,2806678281770971225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:15⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1988,4733135922080582677,2806678281770971225,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 /prefetch:85⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1988,4733135922080582677,2806678281770971225,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 /prefetch:85⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,4733135922080582677,2806678281770971225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4244 /prefetch:15⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,4733135922080582677,2806678281770971225,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:15⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,4733135922080582677,2806678281770971225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:15⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,4733135922080582677,2806678281770971225,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:15⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,4733135922080582677,2806678281770971225,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3068 /prefetch:25⤵PID:3956
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login4⤵PID:2020
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ff8bd9f46f8,0x7ff8bd9f4708,0x7ff8bd9f47185⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,5649080648143735807,7520386067633575623,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1576
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3348 -ip 33481⤵PID:2720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1988 -ip 19881⤵PID:1980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3324 -ip 33241⤵PID:1508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2848 -ip 28481⤵PID:2816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4308 -ip 43081⤵PID:3904
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:828
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4252
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD53e2ba3368a0cedc9f70f13f154c62928
SHA1ea3333cf3d6e69f0db1bd91d878d79611185495e
SHA256dd2e835f7061645268a3bf8a186f8f27dedb961f31820f3ea40dcf765f7c9715
SHA51239aef2c4c93484e15c65452c8a32b538ae36e0befc7eef2907266681542765375b70b294a8627e3e6db99e310d0793f9cd89e20bb759eff62ea1d2ea78556e99
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize960B
MD537d8414c259ed75bf0a8bd2ef649206c
SHA1defcbda0a12505d2f502e2de2ad56bd4997ae5ec
SHA256cfb678fbfabdf05a398633781c0ecdbe85dc786c45f117276e54cb7975afb229
SHA5125cb3ea68d119180cd961bfcba77e5e06ae4c992870e22288d5d8945deb098402151e622927794bcd517e532f3cf7e85963b5ccf31617bb5506646a6eba3924d7
-
Filesize
1KB
MD5f5b7f753446460b47326a33eaf9d602a
SHA14fe65facb1189819c434f9f3014c547234454a9a
SHA25630aa5b7b5f356bec4d74336996198ceac973ac3091c799aea8e073e0447f715f
SHA512081bc642d78036b16851e4d81696580fcb871759f4a7ef871f5ecbccb62767d3b2858bf4fe2a2717e988ac97dfb5603aad2b85d51f0cf3d519dedb5cdacd9f33
-
Filesize
1KB
MD5b9a36387ee8442bc54aeb698d15b8a34
SHA11e51e9527dccd68c326948fa119a265ebd6aa58f
SHA2560b570a7be4499ca5eab3a410a909589aa5fcbd81346695596489313685ece7ee
SHA5129bd501a959adb4eba101e7c99d45766832ff9b95e4caa3d628db69ba458c28b4d20b418c323ca42b0d2e0ae060f323a8b8f2cd8e32b0b0159c6d520b6119c3ef
-
Filesize
6KB
MD59b3c9912920ba6dc393a04a3c6234927
SHA1852f07d4bb338d7bd721949879c1d5e217e7604f
SHA2569a66c2f8c1ceb33f73c126a3334d28fc4e51ef21f3905ec61901976773dcdc1b
SHA51258420880b80f83446d39cc65be964ec6b6eb3f3410dac1e5bec828757caa7b7506a828fca350a4400be6c48eea10f3a9b66297285282523f229b4c065425f85e
-
Filesize
7KB
MD524d0f40704fb5023ed0a6c9d8d8dffba
SHA170573f6ce03bc4543813a0355c58052b10a65c5d
SHA2563e21d50cfd031a2ce2d3e226e90fe8f88d1f8ba687cdea77c97456cf8027fe67
SHA51240fcb6a8fc29052af685a76596e26916d4a78fba11d7c27f4610fe60c33e9b01064d4a229a79f3555dda5ace6deaaa2ac1caf3ed4cc64ca2359a42678ff5fc1b
-
Filesize
872B
MD50cc91b2ce1fd406bdb1285aa035b7487
SHA17aa8775faa9aa393a545087b1c1bbc4c04e08c2c
SHA256babf92cd6575f304f317e0bf7a78a4e65aff03e9b9daf6bbaa79417717598782
SHA51229f026cf5492bf375d06593465d89e4a59e181afbca45f2c4ae97ef32c00463647b436c2d60104b154cd21be901d35a2f1b060ab2075b1b26f32514f553f7cf8
-
Filesize
872B
MD5f11aeb58198b9b6942c5c4f7033d94e3
SHA1059c1451fd986740ae66fb6e1d463c8404990be4
SHA256ac23c4adf94cb49c1ac3fc5058da6aa11ac3af2afc827dfa7476990d8c2e9b74
SHA5124fc0183160962720ad380f724d072eac1d076ee90a3c2616aa1a4b9fb88f9fdf6e079e449eb1aba153b5e17ef507a9069959315ea995107e9d29bf4f97f50b5c
-
Filesize
872B
MD597d88909432c3358aba15aedd02ca9dd
SHA1a24903be3102182f98def9e98eef6ec26d3b6834
SHA256dbea19458188a88178297e847989811cd14ffdc08f75f6de42930e20ef29f586
SHA5122ee6487b97b8c9b5b5ece6695de98470f4cb2a398998d335e037e8a8b58dfbc7477d8fcfa004d60c6bad31e3294e07738b30e501f5ffbf5a136c31350da9c3a7
-
Filesize
872B
MD57f759345dbd7b93d9bb24ab3f97d885a
SHA12bcefe9591a8e1cda5701ecf480c49c33274ebb9
SHA256f0185d43c7a86ae538e01335b33c596d037181eec2218f043ec856bde68018df
SHA51282a44041248bf628525bce58c37a18010d633e2dc8e1c7d736c6edd78383e25b53f0a1a8c42ce47d91c07db9e30e3773b887d587eb8030771e62907a79f6446e
-
Filesize
872B
MD57666eb92758e971ab7441e5d4cf90b66
SHA10f4f636749368fd3edb51b5c201090e69bafd1ed
SHA256a977fb316fad4819a37916d7f987ba474757d7a00f18f7893d416a0860675103
SHA5121401b60319c7a511a7cfc05acd47da76a5841ed79678dc85e983158175517a1814bde50b55f153ec3360c13b8e246f918dbd4c22df1869f2f1cac07e9a49db35
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5bfd575ad9e65a56a7abf12c5d893315b
SHA1ff2754b27365ec093cd3684bd038cdbd4992e976
SHA256a7691b3d551472a3c54162d5cb3e9266d21df7bb79c39e5cde721979db66fdbd
SHA512f322e9a644c56b8676675df1641a97f9b2a91e71174aeb0464ad4a801e57d09e68716cb39d497456a0fa6f37f8cbfa7d4116cb25837d1722ae12bb55544bbb81
-
Filesize
88B
MD50ec04fde104330459c151848382806e8
SHA13b0b78d467f2db035a03e378f7b3a3823fa3d156
SHA2561ee0a6f7c4006a36891e2fd72a0257e89fd79ad811987c0e17f847fe99ea695f
SHA5128b928989f17f09282e008da27e8b7fd373c99d5cafb85b5f623e02dbb6273f0ed76a9fbbfef0b080dbba53b6de8ee491ea379a38e5b6ca0763b11dd4de544b40
-
Filesize
98KB
MD574951f989ef8a5f290f3ef044620766a
SHA158c4660f9809738e12d52b2811375b7f77a5e97d
SHA25643bfc6cbea624dd7b2d26b1d17e80037239fa531e0afd622a18a53c6d8aa6844
SHA5129d9cf97c34a576cc02413b65d09504ea545b821e57ea5f778d48b673b7f82a8909f59986188d42087eb43e9de1de63462351b8095ed1cc4375563874b812c608
-
Filesize
1.3MB
MD59951797f7a302176355592707526dd0d
SHA1e9500765cc890552e271a7931c90b4d4f2996fc4
SHA2560a125631fc2e1f6902cd781cb3ad3c98c664661687452af08891734b8c26035a
SHA512d74fc2c2996abfb9092150fe95ef97a9c6737cfe6a42c3515501bc5380a80ef26f31a60fb44f1296beace71595486e74bace485c2bf61f37aee5942022ec19d2
-
Filesize
1.1MB
MD574a1a72a33c75835129c9928c3e63530
SHA1377576f64371c5fd481fed18b0097af989eb221e
SHA25638e1bfa395dd689afa9556976f0927d723bf9cfb67fabb268171578d69393b40
SHA512297d7f0f98694e144955a499e42d43da26e5187c95a6d9b98063f588a5a4074290aeb66d9109fa51ba50047ae1aa6362f15fa3c97d99773b9c4dbe945f1331ab
-
Filesize
896KB
MD5235de4c4e1de4639c4429e32f8c8445b
SHA1aa7ac049abe6231e2658d3f4015f2ee30386c75d
SHA256ba51205027b106ed76192fcc7b3f7dbd6ff8719dad3c36d7a77a8bc1ae53942d
SHA512f7b3d0e04ed5721f51a2a2bf3e33698c0167a4f261a48e02cbffa1ffdd3a544dac9695b146016eb4f1eee608271d8b61e238b2e48a85b93f37fcfe5da6b453dc
-
Filesize
896KB
MD57de283f141f480bf4eab313b67f9f3e0
SHA1b111e811646e26e2c4b617f44869f0ff270cce61
SHA2563b3588e02768f6692a6484bc0b58c4852369ccc20ce0429c6b19b3e90d110e7e
SHA512d1549eb31eb7c5603c7c4ee70643f1038df47a553d862f44cf86b4e83252ce28b4fd800baa101172bbaebab618bac7be1d92fafba7a936dea591bebe980912ab
-
Filesize
533KB
MD5ef572a64f3f67a69eb1d04124dc5aecb
SHA17465e6dbbe82052ad88b4d935f2f8f6b126f7a5c
SHA256d858cf3c2c964bb17b8f6ece0f89a132fcac1ed359ee7a0081432a6e107bc123
SHA5127f5dd78cfebd7b22e43b8ee6a5112333f2f0bc5eb017173a2bc1dafe832a2964cef390e9c6c35e948a2a6294ae079930bee90ff10765f2cb7b6a11fc8d8c5ad5
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
1.1MB
MD517a1ca1de797894500fdb508517970d4
SHA1eebbfe0d2e88b10a1a0ddad87f3f09627c77aae5
SHA256ab3723025142d624370fc0e7a4be9ea99d09bd9f18531d1abd8f585e78d96c3f
SHA5123694be5a2d777f325d84549cdf0b1b41b7279d639ac8d2ea1e4027b0836a3d329e77315b50d86c43a0df658e8f643a8d6d07743290d62d02674bd4e34c887567