Analysis
-
max time kernel
127s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2024 10:10
Static task
static1
Behavioral task
behavioral1
Sample
4e9ba42bf509f0f21b0a1f5761950e1a3dbdd82dc290dbf5e7bef53f8dc9449b.exe
Resource
win10v2004-20240226-en
General
-
Target
4e9ba42bf509f0f21b0a1f5761950e1a3dbdd82dc290dbf5e7bef53f8dc9449b.exe
-
Size
1.2MB
-
MD5
77ea53409cd3cbb2b02ab8f98ca0329b
-
SHA1
36a3125d8efe9d3f0f0f1329145e9ce894f019b7
-
SHA256
4e9ba42bf509f0f21b0a1f5761950e1a3dbdd82dc290dbf5e7bef53f8dc9449b
-
SHA512
06f30ceaa0c504f4589b8b9a209a2cf35452af89733fc230e3b2d01a6c15d7a208e2e45a90cafb9bc288ec32cd29d9665196f919c5aab3f369cda97571d3637b
-
SSDEEP
24576:WyJSoyMQCEgp7EvcxDyV7gK7i+Ce3Dcc9pwodSu+rdjVxrvkx8kY7lIcjiK11tPI:lJJyMXHpgv8y9gw9CezF9qgSu+rRVx71
Malware Config
Extracted
redline
breha
77.91.124.55:19071
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral1/files/0x0007000000023215-32.dat mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/3216-41-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation 5ag0lK9.exe -
Executes dropped EXE 8 IoCs
pid Process 548 Jp7pq51.exe 3096 IN4Kh02.exe 244 Wy3aP92.exe 3268 1by11sz4.exe 5088 2BQ6439.exe 3748 3wh22BM.exe 4740 4Dj451cP.exe 1820 5ag0lK9.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4e9ba42bf509f0f21b0a1f5761950e1a3dbdd82dc290dbf5e7bef53f8dc9449b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Jp7pq51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" IN4Kh02.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Wy3aP92.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3268 set thread context of 4156 3268 1by11sz4.exe 91 PID 3748 set thread context of 4560 3748 3wh22BM.exe 98 PID 4740 set thread context of 3216 4740 4Dj451cP.exe 107 -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4724 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 1124 3268 WerFault.exe 90 3508 3748 WerFault.exe 96 1796 4740 WerFault.exe 101 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4560 AppLaunch.exe 4560 AppLaunch.exe 4156 AppLaunch.exe 4156 AppLaunch.exe 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 1720 msedge.exe 1720 msedge.exe 3536 Process not Found 3536 Process not Found 1352 msedge.exe 1352 msedge.exe 3536 Process not Found 3536 Process not Found 724 msedge.exe 724 msedge.exe 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4560 AppLaunch.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 4156 AppLaunch.exe Token: SeShutdownPrivilege 3536 Process not Found Token: SeCreatePagefilePrivilege 3536 Process not Found Token: SeShutdownPrivilege 3536 Process not Found Token: SeCreatePagefilePrivilege 3536 Process not Found Token: SeShutdownPrivilege 3536 Process not Found Token: SeCreatePagefilePrivilege 3536 Process not Found Token: SeShutdownPrivilege 3536 Process not Found Token: SeCreatePagefilePrivilege 3536 Process not Found Token: SeShutdownPrivilege 3536 Process not Found Token: SeCreatePagefilePrivilege 3536 Process not Found -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3536 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2604 wrote to memory of 548 2604 4e9ba42bf509f0f21b0a1f5761950e1a3dbdd82dc290dbf5e7bef53f8dc9449b.exe 85 PID 2604 wrote to memory of 548 2604 4e9ba42bf509f0f21b0a1f5761950e1a3dbdd82dc290dbf5e7bef53f8dc9449b.exe 85 PID 2604 wrote to memory of 548 2604 4e9ba42bf509f0f21b0a1f5761950e1a3dbdd82dc290dbf5e7bef53f8dc9449b.exe 85 PID 548 wrote to memory of 3096 548 Jp7pq51.exe 86 PID 548 wrote to memory of 3096 548 Jp7pq51.exe 86 PID 548 wrote to memory of 3096 548 Jp7pq51.exe 86 PID 3096 wrote to memory of 244 3096 IN4Kh02.exe 89 PID 3096 wrote to memory of 244 3096 IN4Kh02.exe 89 PID 3096 wrote to memory of 244 3096 IN4Kh02.exe 89 PID 244 wrote to memory of 3268 244 Wy3aP92.exe 90 PID 244 wrote to memory of 3268 244 Wy3aP92.exe 90 PID 244 wrote to memory of 3268 244 Wy3aP92.exe 90 PID 3268 wrote to memory of 4156 3268 1by11sz4.exe 91 PID 3268 wrote to memory of 4156 3268 1by11sz4.exe 91 PID 3268 wrote to memory of 4156 3268 1by11sz4.exe 91 PID 3268 wrote to memory of 4156 3268 1by11sz4.exe 91 PID 3268 wrote to memory of 4156 3268 1by11sz4.exe 91 PID 3268 wrote to memory of 4156 3268 1by11sz4.exe 91 PID 3268 wrote to memory of 4156 3268 1by11sz4.exe 91 PID 3268 wrote to memory of 4156 3268 1by11sz4.exe 91 PID 244 wrote to memory of 5088 244 Wy3aP92.exe 95 PID 244 wrote to memory of 5088 244 Wy3aP92.exe 95 PID 244 wrote to memory of 5088 244 Wy3aP92.exe 95 PID 3096 wrote to memory of 3748 3096 IN4Kh02.exe 130 PID 3096 wrote to memory of 3748 3096 IN4Kh02.exe 130 PID 3096 wrote to memory of 3748 3096 IN4Kh02.exe 130 PID 3748 wrote to memory of 4560 3748 3wh22BM.exe 98 PID 3748 wrote to memory of 4560 3748 3wh22BM.exe 98 PID 3748 wrote to memory of 4560 3748 3wh22BM.exe 98 PID 3748 wrote to memory of 4560 3748 3wh22BM.exe 98 PID 3748 wrote to memory of 4560 3748 3wh22BM.exe 98 PID 3748 wrote to memory of 4560 3748 3wh22BM.exe 98 PID 548 wrote to memory of 4740 548 Jp7pq51.exe 101 PID 548 wrote to memory of 4740 548 Jp7pq51.exe 101 PID 548 wrote to memory of 4740 548 Jp7pq51.exe 101 PID 4740 wrote to memory of 3216 4740 4Dj451cP.exe 107 PID 4740 wrote to memory of 3216 4740 4Dj451cP.exe 107 PID 4740 wrote to memory of 3216 4740 4Dj451cP.exe 107 PID 4740 wrote to memory of 3216 4740 4Dj451cP.exe 107 PID 4740 wrote to memory of 3216 4740 4Dj451cP.exe 107 PID 4740 wrote to memory of 3216 4740 4Dj451cP.exe 107 PID 4740 wrote to memory of 3216 4740 4Dj451cP.exe 107 PID 4740 wrote to memory of 3216 4740 4Dj451cP.exe 107 PID 2604 wrote to memory of 1820 2604 4e9ba42bf509f0f21b0a1f5761950e1a3dbdd82dc290dbf5e7bef53f8dc9449b.exe 110 PID 2604 wrote to memory of 1820 2604 4e9ba42bf509f0f21b0a1f5761950e1a3dbdd82dc290dbf5e7bef53f8dc9449b.exe 110 PID 2604 wrote to memory of 1820 2604 4e9ba42bf509f0f21b0a1f5761950e1a3dbdd82dc290dbf5e7bef53f8dc9449b.exe 110 PID 1820 wrote to memory of 4548 1820 5ag0lK9.exe 111 PID 1820 wrote to memory of 4548 1820 5ag0lK9.exe 111 PID 4548 wrote to memory of 724 4548 cmd.exe 114 PID 4548 wrote to memory of 724 4548 cmd.exe 114 PID 724 wrote to memory of 1968 724 msedge.exe 115 PID 724 wrote to memory of 1968 724 msedge.exe 115 PID 4548 wrote to memory of 2020 4548 cmd.exe 116 PID 4548 wrote to memory of 2020 4548 cmd.exe 116 PID 2020 wrote to memory of 3044 2020 msedge.exe 117 PID 2020 wrote to memory of 3044 2020 msedge.exe 117 PID 724 wrote to memory of 320 724 msedge.exe 118 PID 724 wrote to memory of 320 724 msedge.exe 118 PID 724 wrote to memory of 320 724 msedge.exe 118 PID 724 wrote to memory of 320 724 msedge.exe 118 PID 724 wrote to memory of 320 724 msedge.exe 118 PID 724 wrote to memory of 320 724 msedge.exe 118 PID 724 wrote to memory of 320 724 msedge.exe 118 PID 724 wrote to memory of 320 724 msedge.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e9ba42bf509f0f21b0a1f5761950e1a3dbdd82dc290dbf5e7bef53f8dc9449b.exe"C:\Users\Admin\AppData\Local\Temp\4e9ba42bf509f0f21b0a1f5761950e1a3dbdd82dc290dbf5e7bef53f8dc9449b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Jp7pq51.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Jp7pq51.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\IN4Kh02.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\IN4Kh02.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Wy3aP92.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Wy3aP92.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:244 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1by11sz4.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1by11sz4.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 5646⤵
- Program crash
PID:1124
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2BQ6439.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2BQ6439.exe5⤵
- Executes dropped EXE
PID:5088
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3wh22BM.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3wh22BM.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 1485⤵
- Program crash
PID:3508
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4Dj451cP.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4Dj451cP.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:3216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 2244⤵
- Program crash
PID:1796
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5ag0lK9.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5ag0lK9.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\6438.tmp\6439.tmp\643A.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5ag0lK9.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffec0ed46f8,0x7ffec0ed4708,0x7ffec0ed47185⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1968,11044935433376729838,11196071949488514362,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1984 /prefetch:25⤵PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1968,11044935433376729838,11196071949488514362,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1968,11044935433376729838,11196071949488514362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:85⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,11044935433376729838,11196071949488514362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:15⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,11044935433376729838,11196071949488514362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:15⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,11044935433376729838,11196071949488514362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3888 /prefetch:15⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1968,11044935433376729838,11196071949488514362,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:85⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1968,11044935433376729838,11196071949488514362,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:85⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,11044935433376729838,11196071949488514362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:15⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,11044935433376729838,11196071949488514362,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:15⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,11044935433376729838,11196071949488514362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:15⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,11044935433376729838,11196071949488514362,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4240 /prefetch:15⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1968,11044935433376729838,11196071949488514362,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2700 /prefetch:25⤵PID:1812
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login4⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffec0ed46f8,0x7ffec0ed4708,0x7ffec0ed47185⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,5591580853784042595,16635774520701549391,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1976 /prefetch:25⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,5591580853784042595,16635774520701549391,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1352
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3268 -ip 32681⤵PID:4376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3748 -ip 37481⤵PID:3768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4740 -ip 47401⤵PID:4456
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4448
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4744
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4724
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize960B
MD57928615be4655452ffea188d8c1adc7f
SHA171f240f79b6d2254ae14a2d83c10d590aaeadcff
SHA256361a4d4c23eb95cdec31ffef5d2d0773ae7ac3aab11b6cb6cf087eb6c07c1b4d
SHA5129b728dd2d5e44b1be13294fedb225531f2d939785cfcf51e39dc48f588b6fbede5e8d90bb1eb3f66c78264877dc1c7f833f233a29a61cc3b213ccf89c2beb14d
-
Filesize
1KB
MD523b8ea1857d52c09a6ad443b22dba1d8
SHA154a23fb06948eede0a9413dd71704612fea60d48
SHA256a422152a6469473f550c6cd62fa53b5f7f9a2e6cfb3022a46ee350f0c22ca0a3
SHA51240f3d30058bb0b673f036d67a703599a2f40b31e6818c3ef5e46018829bdad3e8bb68918b68d5ce4a68f5f7f3f98e1aa78848fc1362c539fc1b01ef84cd2421b
-
Filesize
1KB
MD5dbf7df03320d0e1fd14cb6bedcea282a
SHA1c3a7f532bf3891b3ce51d9e8086ccfde7168886b
SHA2565623908fab785c0207f0f4682ae893973fcfecde667428ebb2dac8257befab0e
SHA51292e8dc8e1996681e141163fc30bc0f25c9b7507d910aeec559b03b737c3059a2325f96c52ca57f336dfbf1a325bce627b180321e5dbadf1b07933beeaf26c462
-
Filesize
7KB
MD54463811f292a08ee09ebe2f4e086a089
SHA1d8a849b133fb838070b7d8c44031ff105694d923
SHA25660e630c7520ec4788f7c3c4d75228115e4805cecd0bb52c9d19e8e160ee63355
SHA51208d1cf278b4c745910511a425e9ed13aab300e27a0b3e240d6d46d912e0f9b4929811ab090e9f78bc79c4e99bffb8d3005f0ff3d0cc2760120fd60bae20de08c
-
Filesize
6KB
MD5a35a1a2f087497d4db169350cf4b583b
SHA18bde13d75940ffb0319e84a081325232c4cf53b8
SHA2566a357d42163601efa255148077c6582c38ad02831b81ae9dfb4fb0245e6019a3
SHA51270e1d955d78244e2d0bdcafd938dcf38437f0752d06e94729d83c8a96012fd79a89a2dc1f001d134622604535335f1fb977a26be6b6ce1b04611f030825744c1
-
Filesize
868B
MD587bc6cbf03a5254d583abae60ce22e24
SHA1618d1f1ef430d79f53396e83841b48a431de7cf3
SHA25688d26dc647b6a6b6cc5666d13c00729027412d34e92cc0dc699bf1cf8406add3
SHA512eef68e1bd2a73dcb0689f43d207ad1ed57c38ac63d2e5d0c3bc47112f9207724b845f646c3784a0c108690e54913b98e1d3d9f85f5a8c671c707dc8f2fcf6a86
-
Filesize
870B
MD5d8b770f79e3b993d6f48496416c99a01
SHA1edce49f393f24fb2da3dbda995fdfdf4d902eddf
SHA2562ec1881b41a523fe540118092efe0b5caa6d1c75b7facee761d62cf86f7fcbcc
SHA512c9762485448f9e31b6639f261d07eeba5cd400e6b761a32d0b5ef562f13bc7afeccc42025a16d0521c7255d5703a54019545ae3a1d62b16d1100378e4ea3f29b
-
Filesize
872B
MD579e4959c7e50c11c6ff0228443484bde
SHA12851428fe26a5beef6bd54043a049477bb1fefd6
SHA2567ae09ed15b40e0b317a3a01fda6a9233c38db7369e6e9978afaf3b9be7c2b745
SHA51262a9ad4803472a124ba5150e3da2f64500b9ac024eedbd1b97317b2e12a128db69bd6f74d292ee71bd286e9eb6d333a3343d9051950f78625e58291738d61ad5
-
Filesize
872B
MD57c5a860ddd2d754871ecb1bee4b418c6
SHA1215757c401a374f2deb34cc109820327cdd8c112
SHA256149c68486dae2901b7183e879a53e3085a8df7fbcc809d0a7c5fe8eb2b789981
SHA5124e20fb7c0b9629c5377ac52947620a367a5e115e4de3a81b089519030b8579d1c192b611786f122e37751efc9b970b9d1c0774bb6ef37cb6a32368ca8fa1417f
-
Filesize
872B
MD5c8d798789ceadd25f509f270c602ceb4
SHA1237228f9dbc289f101cde9a120706475af06bd9d
SHA256aab33fe273009bc53a988d92b225d498846c529cd772a62bc06d844d525e5a35
SHA5122b6aa2e1263e603f7c4f72da3806745dfee9aa282f3fa2990daf9d53ad615e87f6bc4d0bf1aba1dba12ed813dacfe7b4c25351c631b1e04f0d827f0597dbecab
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57f5f87d43e1c34e799c9da9a941a8de2
SHA10145d26d39d5f28f06d7db0bf721f67e867e87cd
SHA2569808ec88f1fbd01be799380aca56a092261f72babc8c2dc3ce39d0f7e71e2c76
SHA512ed7f1512372a61c9ec2e23e9b96c5d10e3b6d0ff29b90abb16cf5b611c351892e635174b82ab0129ed1a2d49875577c5da6e75f73642aabd1ec6a3c9f21d114c
-
Filesize
8KB
MD55f7d01fbc357acb93463b5aadccf6913
SHA1f81b56965a13e7d4872dcf5ce5381aa6d6540388
SHA256d20051f2fb1605c858d8920138d152b341da06a0ad72dc4914ca7ff48ae4b4c2
SHA512863ff426df3eb4e8b4d5b53e5187525189ece12745d08e01c9cae60ee5b783634129064525162b3dd1de14501ed0f8fafa58ba8d8cc8320ebab85fa7c7f69689
-
Filesize
88B
MD50ec04fde104330459c151848382806e8
SHA13b0b78d467f2db035a03e378f7b3a3823fa3d156
SHA2561ee0a6f7c4006a36891e2fd72a0257e89fd79ad811987c0e17f847fe99ea695f
SHA5128b928989f17f09282e008da27e8b7fd373c99d5cafb85b5f623e02dbb6273f0ed76a9fbbfef0b080dbba53b6de8ee491ea379a38e5b6ca0763b11dd4de544b40
-
Filesize
98KB
MD56d04a211dfcf2f1d8175337d323304c5
SHA1b299527bea59649bcf8212a22f2525c99fff5b7a
SHA256b0068c67d2436505e7126346cac1147645287bed0ab5ef0eeea6e6ef32468453
SHA512961deb79eada13c3c38f6cc43e0d298516984db3ced3a2b5f4589969570267a31a2d6cf585e673caa94db4afd556122adb4507f38eadc03691a9a410d734fbaf
-
Filesize
1.1MB
MD5a1e2f2e5fa3baa6a0dca3bb77c227517
SHA11c1a75381d85cd9be3175cfe8e2299c113c8f38a
SHA256c2ac7f9f9baa03cf766696621347f34c27867850708e4e27fac6dfdeb6d5ba04
SHA512fb27275de82de1985746b9d0f822e57af108051b873961f6bbca708a03e129484105b71c0495b689211d9bc640b4a60eca7648f2cec8235daa8d2fe36c12a863
-
Filesize
1.1MB
MD553abf2d6265459cf35e04548bfa1b809
SHA1445fb02774dd192f27efa5b3ce913a38b965b8c5
SHA256dccbc3337bc5a2c3142d2890b1044ba64796c64ed96ee11c2af5fe0ad01a5232
SHA512bddf70af89ff866209859c6abdba7d1dcaccbd11151bf84184254425b3387bb226eab663742134cd0b06a8d1ad07e3d7611442b24f2b389b60a68c020c4c8728
-
Filesize
691KB
MD50a9dbda1784ce40906cb6e268e4e12a9
SHA1b3968288f2e174f5a566e68ca8e86d5863331e79
SHA256d954bf71808f120b8451d07497aca57df31b692b67768467404a66ac89244e3f
SHA512075406229ab279697336199db5681256e7da33eb955cd470fbd53af564bc367cda6ed47140e49b63c2280403ebc898dd3b59af93ce9b06d1daeba75d00ca2e3e
-
Filesize
896KB
MD500c2b0d98c5c1eef30745ad5bf3d7a0d
SHA13163dd832a58e7cfa4a95f8537a1738bfd5a270f
SHA256e6c7e512063e1e31ae10e5ff0cc9e2c4f453d67acb7691008e8db33cb5ee17c7
SHA512321d3d871eb71dfef481c5ba03d158b4e5a8e4793602ff490ec0446b0ab6632db099ece75d3007e4a974359c7d1b27478e0cf77e3c103b8c4396aac8d2a69cde
-
Filesize
330KB
MD59c76487d40bbb19823d3462a3d46fbe1
SHA12c1fb84e4d6a6c3612e9846ce307302ad7e53cd1
SHA256fef640bbe57a9ec330b8d7ce2ba345866166391abf6a1eb3936f4b1044a0cc75
SHA5129891222cae8ec9853cd084ebc109a2cf036444fb0c40a784685d6ec1a2cfabecd71dd02cc3a8edcbc7cab37e684faae20aae5ad6221c8d04e0bfc65292deb8b1
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
180KB
MD53f305144feb3040cf41b216841537ec2
SHA1ae9066cc3b40be6250e7e6a90bcc2de160067b84
SHA25689fec546032f1fc58fb08e79ab626d7e2401a5958b81a928ab5e0c1540e180b1
SHA512ca3993ad5d0a376809e304a49eaf81c8ba3ecbe40e7085573698b1870291034f9bbfdec552b640b32d92b2f0b359f33c40f694f401abaf81d70ab7a6484a798e