Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2024 10:10
Static task
static1
Behavioral task
behavioral1
Sample
b845d0fcdba96d43d571a8a8500c9f2db33cd9f8bf03dc75f7a36a97d35ccac7.exe
Resource
win10v2004-20240226-en
General
-
Target
b845d0fcdba96d43d571a8a8500c9f2db33cd9f8bf03dc75f7a36a97d35ccac7.exe
-
Size
1.3MB
-
MD5
569fd5339c6db72ca8fbee60173223f7
-
SHA1
4cc659429c5dc5b69693f7e9da24e553d61fafe3
-
SHA256
b845d0fcdba96d43d571a8a8500c9f2db33cd9f8bf03dc75f7a36a97d35ccac7
-
SHA512
5ba01cb36f3902eea832a7021b0857f2894851b1163717465baf8960a2b45404a4e097eae1d3723c0e1c708ba1674981d769d8874bc2a32310e11141bea19c18
-
SSDEEP
24576:cyGJ/IEZe2uHX0qnzDhxVpYv7oqYi++MwPHeBUmd879lYOE2DbEwUS69gvyBORS4:LGZfg2a0qNaoH9+MwfeauOEAEwUX6qk
Malware Config
Extracted
redline
breha
77.91.124.55:19071
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral1/files/0x0007000000023222-31.dat mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/3076-41-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation 5Hm0oU9.exe -
Executes dropped EXE 8 IoCs
pid Process 3080 Qh5SS94.exe 228 Yp9AJ22.exe 4704 aw5ha52.exe 4612 1ps75KF7.exe 4164 2ee0588.exe 2668 3yv54NY.exe 4308 4jG519TJ.exe 1412 5Hm0oU9.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Yp9AJ22.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" aw5ha52.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b845d0fcdba96d43d571a8a8500c9f2db33cd9f8bf03dc75f7a36a97d35ccac7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Qh5SS94.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4612 set thread context of 2628 4612 1ps75KF7.exe 92 PID 2668 set thread context of 456 2668 3yv54NY.exe 99 PID 4308 set thread context of 3076 4308 4jG519TJ.exe 102 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 860 4612 WerFault.exe 91 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2628 AppLaunch.exe 2628 AppLaunch.exe 456 AppLaunch.exe 456 AppLaunch.exe 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 4320 msedge.exe 4320 msedge.exe 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 652 msedge.exe 652 msedge.exe 3368 Process not Found 3368 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 456 AppLaunch.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2628 AppLaunch.exe Token: SeShutdownPrivilege 3368 Process not Found Token: SeCreatePagefilePrivilege 3368 Process not Found Token: SeShutdownPrivilege 3368 Process not Found Token: SeCreatePagefilePrivilege 3368 Process not Found Token: SeShutdownPrivilege 3368 Process not Found Token: SeCreatePagefilePrivilege 3368 Process not Found Token: SeShutdownPrivilege 3368 Process not Found Token: SeCreatePagefilePrivilege 3368 Process not Found Token: SeShutdownPrivilege 3368 Process not Found Token: SeCreatePagefilePrivilege 3368 Process not Found -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3368 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5012 wrote to memory of 3080 5012 b845d0fcdba96d43d571a8a8500c9f2db33cd9f8bf03dc75f7a36a97d35ccac7.exe 86 PID 5012 wrote to memory of 3080 5012 b845d0fcdba96d43d571a8a8500c9f2db33cd9f8bf03dc75f7a36a97d35ccac7.exe 86 PID 5012 wrote to memory of 3080 5012 b845d0fcdba96d43d571a8a8500c9f2db33cd9f8bf03dc75f7a36a97d35ccac7.exe 86 PID 3080 wrote to memory of 228 3080 Qh5SS94.exe 88 PID 3080 wrote to memory of 228 3080 Qh5SS94.exe 88 PID 3080 wrote to memory of 228 3080 Qh5SS94.exe 88 PID 228 wrote to memory of 4704 228 Yp9AJ22.exe 90 PID 228 wrote to memory of 4704 228 Yp9AJ22.exe 90 PID 228 wrote to memory of 4704 228 Yp9AJ22.exe 90 PID 4704 wrote to memory of 4612 4704 aw5ha52.exe 91 PID 4704 wrote to memory of 4612 4704 aw5ha52.exe 91 PID 4704 wrote to memory of 4612 4704 aw5ha52.exe 91 PID 4612 wrote to memory of 2628 4612 1ps75KF7.exe 92 PID 4612 wrote to memory of 2628 4612 1ps75KF7.exe 92 PID 4612 wrote to memory of 2628 4612 1ps75KF7.exe 92 PID 4612 wrote to memory of 2628 4612 1ps75KF7.exe 92 PID 4612 wrote to memory of 2628 4612 1ps75KF7.exe 92 PID 4612 wrote to memory of 2628 4612 1ps75KF7.exe 92 PID 4612 wrote to memory of 2628 4612 1ps75KF7.exe 92 PID 4612 wrote to memory of 2628 4612 1ps75KF7.exe 92 PID 4704 wrote to memory of 4164 4704 aw5ha52.exe 96 PID 4704 wrote to memory of 4164 4704 aw5ha52.exe 96 PID 4704 wrote to memory of 4164 4704 aw5ha52.exe 96 PID 228 wrote to memory of 2668 228 Yp9AJ22.exe 97 PID 228 wrote to memory of 2668 228 Yp9AJ22.exe 97 PID 228 wrote to memory of 2668 228 Yp9AJ22.exe 97 PID 2668 wrote to memory of 456 2668 3yv54NY.exe 99 PID 2668 wrote to memory of 456 2668 3yv54NY.exe 99 PID 2668 wrote to memory of 456 2668 3yv54NY.exe 99 PID 2668 wrote to memory of 456 2668 3yv54NY.exe 99 PID 2668 wrote to memory of 456 2668 3yv54NY.exe 99 PID 2668 wrote to memory of 456 2668 3yv54NY.exe 99 PID 3080 wrote to memory of 4308 3080 Qh5SS94.exe 100 PID 3080 wrote to memory of 4308 3080 Qh5SS94.exe 100 PID 3080 wrote to memory of 4308 3080 Qh5SS94.exe 100 PID 4308 wrote to memory of 3076 4308 4jG519TJ.exe 102 PID 4308 wrote to memory of 3076 4308 4jG519TJ.exe 102 PID 4308 wrote to memory of 3076 4308 4jG519TJ.exe 102 PID 4308 wrote to memory of 3076 4308 4jG519TJ.exe 102 PID 4308 wrote to memory of 3076 4308 4jG519TJ.exe 102 PID 4308 wrote to memory of 3076 4308 4jG519TJ.exe 102 PID 4308 wrote to memory of 3076 4308 4jG519TJ.exe 102 PID 4308 wrote to memory of 3076 4308 4jG519TJ.exe 102 PID 5012 wrote to memory of 1412 5012 b845d0fcdba96d43d571a8a8500c9f2db33cd9f8bf03dc75f7a36a97d35ccac7.exe 103 PID 5012 wrote to memory of 1412 5012 b845d0fcdba96d43d571a8a8500c9f2db33cd9f8bf03dc75f7a36a97d35ccac7.exe 103 PID 5012 wrote to memory of 1412 5012 b845d0fcdba96d43d571a8a8500c9f2db33cd9f8bf03dc75f7a36a97d35ccac7.exe 103 PID 1412 wrote to memory of 444 1412 5Hm0oU9.exe 104 PID 1412 wrote to memory of 444 1412 5Hm0oU9.exe 104 PID 444 wrote to memory of 1836 444 cmd.exe 107 PID 444 wrote to memory of 1836 444 cmd.exe 107 PID 1836 wrote to memory of 2316 1836 msedge.exe 108 PID 1836 wrote to memory of 2316 1836 msedge.exe 108 PID 444 wrote to memory of 3772 444 cmd.exe 109 PID 444 wrote to memory of 3772 444 cmd.exe 109 PID 3772 wrote to memory of 3896 3772 msedge.exe 110 PID 3772 wrote to memory of 3896 3772 msedge.exe 110 PID 1836 wrote to memory of 1952 1836 msedge.exe 111 PID 1836 wrote to memory of 1952 1836 msedge.exe 111 PID 1836 wrote to memory of 1952 1836 msedge.exe 111 PID 1836 wrote to memory of 1952 1836 msedge.exe 111 PID 1836 wrote to memory of 1952 1836 msedge.exe 111 PID 1836 wrote to memory of 1952 1836 msedge.exe 111 PID 1836 wrote to memory of 1952 1836 msedge.exe 111 PID 1836 wrote to memory of 1952 1836 msedge.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b845d0fcdba96d43d571a8a8500c9f2db33cd9f8bf03dc75f7a36a97d35ccac7.exe"C:\Users\Admin\AppData\Local\Temp\b845d0fcdba96d43d571a8a8500c9f2db33cd9f8bf03dc75f7a36a97d35ccac7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Qh5SS94.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Qh5SS94.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Yp9AJ22.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Yp9AJ22.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aw5ha52.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aw5ha52.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1ps75KF7.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1ps75KF7.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4612 -s 5926⤵
- Program crash
PID:860
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2ee0588.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2ee0588.exe5⤵
- Executes dropped EXE
PID:4164
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3yv54NY.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3yv54NY.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:456
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4jG519TJ.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4jG519TJ.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:3076
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5Hm0oU9.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5Hm0oU9.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7F61.tmp\7F62.tmp\7F63.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5Hm0oU9.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/4⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffd32e146f8,0x7ffd32e14708,0x7ffd32e147185⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,17205911833306707567,5593676650437830532,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:25⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,17205911833306707567,5593676650437830532,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:4320
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login4⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffd32e146f8,0x7ffd32e14708,0x7ffd32e147185⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,13018255829752953045,11171856532693802171,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:25⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,13018255829752953045,11171856532693802171,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,13018255829752953045,11171856532693802171,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:85⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13018255829752953045,11171856532693802171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:15⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13018255829752953045,11171856532693802171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:15⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13018255829752953045,11171856532693802171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:15⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,13018255829752953045,11171856532693802171,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:85⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,13018255829752953045,11171856532693802171,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:85⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13018255829752953045,11171856532693802171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:15⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13018255829752953045,11171856532693802171,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:15⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13018255829752953045,11171856532693802171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:15⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13018255829752953045,11171856532693802171,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:15⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,13018255829752953045,11171856532693802171,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3944 /prefetch:25⤵PID:2504
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4612 -ip 46121⤵PID:4824
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1816
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4896
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50764f5481d3c05f5d391a36463484b49
SHA12c96194f04e768ac9d7134bc242808e4d8aeb149
SHA256cc773d1928f4a87e10944d153c23a7b20222b6795c9a0a09b81a94c1bd026ac3
SHA512a39e4cb7064fdd7393ffe7bb3a5e672b1bdc14d878cac1c5c9ceb97787454c5a4e7f9ae0020c6d524920caf7eadc9d49e10bee8799d73ee4e8febe7e51e22224
-
Filesize
152B
MD5e494d16e4b331d7fc483b3ae3b2e0973
SHA1d13ca61b6404902b716f7b02f0070dec7f36edbf
SHA256a43f82254638f7e05d1fea29e83545642f163a7a852f567fb2e94f0634347165
SHA512016b0ed886b33d010c84ca080d74fa343da110db696655c94b71a4cb8eb8284748dd83e06d0891a6e1e859832b0f1d07748b11d4d1a4576bbe1bee359e218737
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize960B
MD5816d14d87345826950b8be2fe0d0562e
SHA11fb18d1557675e0e71aaa0331e7a6ea7593aa39d
SHA2565c0394c15041c872539906bf2e49c74e9e2baaaa1464831bffda0253b1fd280b
SHA5123d577b81eb085024f5dfe03c70eb23bd7fbb5269e56a4a4b6b18773cefdd606fc0119056898351f93e49c04166c5f7037373f52b2c88b9de5a02524e468851b7
-
Filesize
1KB
MD5b3bdf62e2b0f437447d757168c341898
SHA103bcb09906d15ee7bbcf8abb599e525525054b59
SHA256a26e6b2e5fdd7d5b219255a90d62504a62539e43eab7f630fe4abcc6321cd93e
SHA512df176a8215a8acbf1cd8260d5412501370df7324237390931a8b6833bce126056c7710ff656f562bcb8b605c7f58bad6774d6ec5750d2146d28660420d2bcc10
-
Filesize
1KB
MD58cae28c91371ca6ce6529c1b35c84c75
SHA1a2e5962a9647e629059933a19f1254f6dd113347
SHA2565cfcedbbfc11c4779a6bf978bb452dc6334f492e120855dab08ac2b05b9504a0
SHA5124d138a8156c186b76638fc8d2b063e48646ac5e08500ec28320681ab92dd21bcd00c2293e3ced9b8a289e5a2c8748b7e21797ac4ae3b7400750d2ddd03ce8b87
-
Filesize
6KB
MD5cd34c9ea6d19cebf8d21b1e8cda838dd
SHA15ba9d3047c42cd67e286a9107957a53ee80d0b7e
SHA256f90e3f17fee240d418b0b433e11fa2a0fa794f5147c841d75fba217aeecc3d6f
SHA51299c8dd5ad3ee4155dc96657f1b9b16914a030a1606b2a6eb1e71d901fb0bd818a7f034d455cc4e42579147cd77f9105de20c25276c9b7806b6cbcc04039ea3df
-
Filesize
7KB
MD5c9430e23c2fc25c2f67530e80e85fda1
SHA17ac48023c0ab0fe8b7196b9aaeaf4e2f6b975961
SHA256228f518e9472b20f5cdc9a35d50277133c39e75793667e80bbb61e6955cd95c3
SHA512238c1b74c7cee6776fe29da4587f26546d9f8efd0cc3112cbe0fa163f3309889b6d0e1afae97b202493edcfdee3e9fdc831e136af9aa2c0e2b053b93bfb303cc
-
Filesize
870B
MD5adaff4e0ef5e373a9a53d10258bb9ed6
SHA189e8202b92920e020b3f8745b8382f21f58be5cd
SHA256bb92a612edf5b40a47bc019b23d0978a8433dae3e828d4e1269e3b8b38773d77
SHA5122dcb55152c38693cb0b0593be04f55d3df222283fe557ac87f28fdba456fa6c3565e0e9e3c57daf8dd49ac01130817449e97224e91d903eb9cfc49648d70aca6
-
Filesize
872B
MD5a9ad07239c4b3df154758e0bdd20d00e
SHA15eee6fc162837b03070b9631efc49ffcd8a751de
SHA25653c3b75af9ece56632891c144f6fe0e00ca1539e3ee87e6bfc9d864e0bb579dc
SHA5120edcb87f3c1134f65e6384ad8d56f061b01df3d882fb1ec53108c637c06a407c44f33080e500ccb3821fad7170415b81ac03f2ef46e0ab6997a8cedab0e14055
-
Filesize
872B
MD5aa2dcb72426265954d76ce315468d6ff
SHA1db60db5d650d6d4faa232be63a63c784733f72ad
SHA2563bb85d19a8d42d5ec07264e716f82991e4419c2ea1f7b11ff402e494722118d7
SHA512e6d5ef1fcae7e2e4374d189cdf536a0f927852d37bf4ed00ea9f3ea2afeedad9e83b1cfb560eb598eef83738f9f18aaacf383939a23df8188fbee7dbaa6c913c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f695dbcb502ba3533b02bcd60a7c4813
SHA170e23a80d4b688fad64b1649e929589ed566f978
SHA2561ed6483d36d490c88db87ca01a5bf5c2ddcd802891335cf560e57a2f06f98279
SHA5124b3f08288ff8d04c7b8339063e083190e552bbb074f3e0db18ce0fd7245819fb19989cf07c3c8f2ca50ecb817eab0c770c26762a195e4cbd15fd94c94bdfbda0
-
Filesize
11KB
MD55aeaa8c1b21c1c040b9741309e1ed5f1
SHA1c2e330473e8f78e9e0225b06aa6285cf277dc76d
SHA25691d36ba4e4d580e95d515767d1b6924a22759ab34b6a0a4294c47b01f374af6e
SHA512e63135b203e6c6a6b3df97e02ca68265edb179ac73e3b655ee227efbc65730d466fe1ac140a3e973722d8070d065559f8a9686ba1e36b69570604f458c92b10c
-
Filesize
8KB
MD5da2faf2186ff0b30e27f24e83511d1c8
SHA1cc5590ec0d29e2743bb566cbd1505851b872e4f3
SHA2566f731d31690ced5c601b78b3175277526f2156cfc674eab5febe5d1e9d077639
SHA512835f7755f8552e0ddf145a06d88228abe1710b05cd9e1ba9e2f9b514086044d370213a3febad4d99daa60c1e72c43be15e3d5abf220b4cc6adee8f9c9b5d8df2
-
Filesize
88B
MD50ec04fde104330459c151848382806e8
SHA13b0b78d467f2db035a03e378f7b3a3823fa3d156
SHA2561ee0a6f7c4006a36891e2fd72a0257e89fd79ad811987c0e17f847fe99ea695f
SHA5128b928989f17f09282e008da27e8b7fd373c99d5cafb85b5f623e02dbb6273f0ed76a9fbbfef0b080dbba53b6de8ee491ea379a38e5b6ca0763b11dd4de544b40
-
Filesize
98KB
MD55a492f05d6f6ed85d5682efc4b97ac70
SHA11a6ce182cea00f76fc6b816c0673b4fc31791aef
SHA2562f97f04ff533b02611740297584eca7020f581e3942154219a5e129a6a7945fd
SHA512798c10403b1eb24c36b32e5be9321371712812ea6109cd84f461e02c33a74c3c6510cc58cea2eb9994e1e6deb13acaf877c5476fac4ea10fd7de4d16dbc5ff01
-
Filesize
1.1MB
MD597ab8b3b76d3aa5cdc61b3530e444907
SHA18e3f46f680e7b69e893dc07b12b2cab51153ad9a
SHA2563eceb0ccf0f2c7cc8ab9dbc123069e2b7b734fd53e0d46ebca511c874674f430
SHA51274714cb412981fbe5fbbe195de8cff9eff8563a21d780b2430a9421da74ff4fd8f7afd7bbb02d8b074a53af46da5f74b6b9092b56459e2a30cce2c00003a9b1f
-
Filesize
1.2MB
MD5877c9d68b5fdff10c6ddf89247fb7195
SHA19c64d2df8decf791d5b5b69c71e200b1eaa3d6ea
SHA2568efa36d5643ea6693bb6fb054816a221e949c3800f28f1804da84dbb57991e91
SHA512a9c077b2b2c9f8b12b2410d2be73ed25fa474ea1fea74d712d524db303731268dd120354eabef4f12841bb290266121323c758b835e4f51a707c058c6666e3c8
-
Filesize
707KB
MD5ead9bd1087e63b4176e864e8ba4ca6dc
SHA13c77f5adc1913e0b51fcdf79073b1caa845208bd
SHA256c89ad2635f29c9d9701c27a5203888e8fb88c082896a12d10196476b25b693ca
SHA5125461f5423dec1ef8da8bfe7b5254a6801c4ce8f6b8da0f931c33a4c7e73a2992d5ddc17165043241c5e904a880730e733c43c26886336fd929f88cd3d5b28664
-
Filesize
966KB
MD5a2cc75db2d8eae312c81009b5592a59b
SHA150294362dbc7ad43036703bf75086ff235acd2c9
SHA2567db46b5aba313943d666be245231c5666b0afc04f9a7c7baf69b15480508ccab
SHA51237c425dea607d5e83748e7469810533c667d06898ae74866623ebe9864e39792f9349fa1c171f81840ffe535bbd9289d928cc9bae3822b91e5766f2333bb9fda
-
Filesize
330KB
MD522039dd42004777c7b7b34504a11ea21
SHA11fe3d708a2705ebadd258f3a856ba65fd3741b44
SHA25683bd6f89b44069d29e95555968c5a823b52f2187a87ce1622fd90404ccbe2a26
SHA51241998a03f480d9cb4d74817cd23322eb84b270ab5e174f594e4e534c1ecadf2f390ec63395ffeb0334c512e45167eea62355f75fc57e5b18bcbe1f1fb48e9fd8
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
180KB
MD53f305144feb3040cf41b216841537ec2
SHA1ae9066cc3b40be6250e7e6a90bcc2de160067b84
SHA25689fec546032f1fc58fb08e79ab626d7e2401a5958b81a928ab5e0c1540e180b1
SHA512ca3993ad5d0a376809e304a49eaf81c8ba3ecbe40e7085573698b1870291034f9bbfdec552b640b32d92b2f0b359f33c40f694f401abaf81d70ab7a6484a798e