Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2024 10:10
Static task
static1
Behavioral task
behavioral1
Sample
e74823510942cf2652d1cb04f1bc8cac0369eb6a62ad431cbef2eed833e6ab42.exe
Resource
win10v2004-20240226-en
General
-
Target
e74823510942cf2652d1cb04f1bc8cac0369eb6a62ad431cbef2eed833e6ab42.exe
-
Size
1.2MB
-
MD5
536a22121ee569d64ac677f9bb43ffcf
-
SHA1
a13d77e09301ad007a6bbc713f676cf3c7f76d75
-
SHA256
e74823510942cf2652d1cb04f1bc8cac0369eb6a62ad431cbef2eed833e6ab42
-
SHA512
1583bd6d96fb57c661c3acf0ca21e7bd3eb06165a855c815e6bfc604cf7238054bde72c64520b9e45fa1febf6b4219078f1ad5fd2a3c42e4b6f2d44c1dbb759a
-
SSDEEP
24576:nyIMbyycgFDgnC72ldi+I6MUrpIiI1imLA3WEdxDjvp2JCMMW:yIsyy3inM2v9I6MQDOLA3fEYt
Malware Config
Extracted
redline
breha
77.91.124.55:19071
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral1/files/0x00070000000231e8-32.dat mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/3168-41-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation 5Oq5Cw4.exe -
Executes dropped EXE 8 IoCs
pid Process 1584 Ow2XF86.exe 2008 zT2mK41.exe 3328 Qf7GU34.exe 3096 1Ub82Ed6.exe 1784 2NL7341.exe 3076 3Nn66TZ.exe 2568 4An033Jw.exe 876 5Oq5Cw4.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e74823510942cf2652d1cb04f1bc8cac0369eb6a62ad431cbef2eed833e6ab42.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Ow2XF86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zT2mK41.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Qf7GU34.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3096 set thread context of 5060 3096 1Ub82Ed6.exe 91 PID 3076 set thread context of 4648 3076 3Nn66TZ.exe 98 PID 2568 set thread context of 3168 2568 4An033Jw.exe 110 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 2388 3096 WerFault.exe 1644 3076 WerFault.exe 96 1880 2568 WerFault.exe 101 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4648 AppLaunch.exe 4648 AppLaunch.exe 5060 AppLaunch.exe 5060 AppLaunch.exe 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 4228 msedge.exe 4228 msedge.exe 3352 Process not Found 3352 Process not Found 2652 msedge.exe 2652 msedge.exe 3352 Process not Found 3352 Process not Found 5112 msedge.exe 5112 msedge.exe 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4648 AppLaunch.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 5060 AppLaunch.exe Token: SeShutdownPrivilege 3352 Process not Found Token: SeCreatePagefilePrivilege 3352 Process not Found Token: SeShutdownPrivilege 3352 Process not Found Token: SeCreatePagefilePrivilege 3352 Process not Found Token: SeShutdownPrivilege 3352 Process not Found Token: SeCreatePagefilePrivilege 3352 Process not Found Token: SeShutdownPrivilege 3352 Process not Found Token: SeCreatePagefilePrivilege 3352 Process not Found Token: SeShutdownPrivilege 3352 Process not Found Token: SeCreatePagefilePrivilege 3352 Process not Found -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3352 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 628 wrote to memory of 1584 628 e74823510942cf2652d1cb04f1bc8cac0369eb6a62ad431cbef2eed833e6ab42.exe 84 PID 628 wrote to memory of 1584 628 e74823510942cf2652d1cb04f1bc8cac0369eb6a62ad431cbef2eed833e6ab42.exe 84 PID 628 wrote to memory of 1584 628 e74823510942cf2652d1cb04f1bc8cac0369eb6a62ad431cbef2eed833e6ab42.exe 84 PID 1584 wrote to memory of 2008 1584 Ow2XF86.exe 86 PID 1584 wrote to memory of 2008 1584 Ow2XF86.exe 86 PID 1584 wrote to memory of 2008 1584 Ow2XF86.exe 86 PID 2008 wrote to memory of 3328 2008 zT2mK41.exe 88 PID 2008 wrote to memory of 3328 2008 zT2mK41.exe 88 PID 2008 wrote to memory of 3328 2008 zT2mK41.exe 88 PID 3328 wrote to memory of 3096 3328 Qf7GU34.exe 135 PID 3328 wrote to memory of 3096 3328 Qf7GU34.exe 135 PID 3328 wrote to memory of 3096 3328 Qf7GU34.exe 135 PID 3096 wrote to memory of 5060 3096 1Ub82Ed6.exe 91 PID 3096 wrote to memory of 5060 3096 1Ub82Ed6.exe 91 PID 3096 wrote to memory of 5060 3096 1Ub82Ed6.exe 91 PID 3096 wrote to memory of 5060 3096 1Ub82Ed6.exe 91 PID 3096 wrote to memory of 5060 3096 1Ub82Ed6.exe 91 PID 3096 wrote to memory of 5060 3096 1Ub82Ed6.exe 91 PID 3096 wrote to memory of 5060 3096 1Ub82Ed6.exe 91 PID 3096 wrote to memory of 5060 3096 1Ub82Ed6.exe 91 PID 3328 wrote to memory of 1784 3328 Qf7GU34.exe 95 PID 3328 wrote to memory of 1784 3328 Qf7GU34.exe 95 PID 3328 wrote to memory of 1784 3328 Qf7GU34.exe 95 PID 2008 wrote to memory of 3076 2008 zT2mK41.exe 96 PID 2008 wrote to memory of 3076 2008 zT2mK41.exe 96 PID 2008 wrote to memory of 3076 2008 zT2mK41.exe 96 PID 3076 wrote to memory of 4648 3076 3Nn66TZ.exe 98 PID 3076 wrote to memory of 4648 3076 3Nn66TZ.exe 98 PID 3076 wrote to memory of 4648 3076 3Nn66TZ.exe 98 PID 3076 wrote to memory of 4648 3076 3Nn66TZ.exe 98 PID 3076 wrote to memory of 4648 3076 3Nn66TZ.exe 98 PID 3076 wrote to memory of 4648 3076 3Nn66TZ.exe 98 PID 1584 wrote to memory of 2568 1584 Ow2XF86.exe 101 PID 1584 wrote to memory of 2568 1584 Ow2XF86.exe 101 PID 1584 wrote to memory of 2568 1584 Ow2XF86.exe 101 PID 2568 wrote to memory of 2508 2568 4An033Jw.exe 107 PID 2568 wrote to memory of 2508 2568 4An033Jw.exe 107 PID 2568 wrote to memory of 2508 2568 4An033Jw.exe 107 PID 2568 wrote to memory of 1804 2568 4An033Jw.exe 108 PID 2568 wrote to memory of 1804 2568 4An033Jw.exe 108 PID 2568 wrote to memory of 1804 2568 4An033Jw.exe 108 PID 2568 wrote to memory of 1504 2568 4An033Jw.exe 109 PID 2568 wrote to memory of 1504 2568 4An033Jw.exe 109 PID 2568 wrote to memory of 1504 2568 4An033Jw.exe 109 PID 2568 wrote to memory of 3168 2568 4An033Jw.exe 110 PID 2568 wrote to memory of 3168 2568 4An033Jw.exe 110 PID 2568 wrote to memory of 3168 2568 4An033Jw.exe 110 PID 2568 wrote to memory of 3168 2568 4An033Jw.exe 110 PID 2568 wrote to memory of 3168 2568 4An033Jw.exe 110 PID 2568 wrote to memory of 3168 2568 4An033Jw.exe 110 PID 2568 wrote to memory of 3168 2568 4An033Jw.exe 110 PID 2568 wrote to memory of 3168 2568 4An033Jw.exe 110 PID 628 wrote to memory of 876 628 e74823510942cf2652d1cb04f1bc8cac0369eb6a62ad431cbef2eed833e6ab42.exe 113 PID 628 wrote to memory of 876 628 e74823510942cf2652d1cb04f1bc8cac0369eb6a62ad431cbef2eed833e6ab42.exe 113 PID 628 wrote to memory of 876 628 e74823510942cf2652d1cb04f1bc8cac0369eb6a62ad431cbef2eed833e6ab42.exe 113 PID 876 wrote to memory of 3468 876 5Oq5Cw4.exe 114 PID 876 wrote to memory of 3468 876 5Oq5Cw4.exe 114 PID 3468 wrote to memory of 5112 3468 cmd.exe 117 PID 3468 wrote to memory of 5112 3468 cmd.exe 117 PID 5112 wrote to memory of 2140 5112 msedge.exe 118 PID 5112 wrote to memory of 2140 5112 msedge.exe 118 PID 3468 wrote to memory of 3176 3468 cmd.exe 119 PID 3468 wrote to memory of 3176 3468 cmd.exe 119 PID 3176 wrote to memory of 2608 3176 msedge.exe 120 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e74823510942cf2652d1cb04f1bc8cac0369eb6a62ad431cbef2eed833e6ab42.exe"C:\Users\Admin\AppData\Local\Temp\e74823510942cf2652d1cb04f1bc8cac0369eb6a62ad431cbef2eed833e6ab42.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ow2XF86.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ow2XF86.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zT2mK41.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zT2mK41.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Qf7GU34.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Qf7GU34.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Ub82Ed6.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Ub82Ed6.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 5686⤵
- Program crash
PID:2388
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2NL7341.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2NL7341.exe5⤵
- Executes dropped EXE
PID:1784
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3Nn66TZ.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3Nn66TZ.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3076 -s 5725⤵
- Program crash
PID:1644
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4An033Jw.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4An033Jw.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:2508
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:1804
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:1504
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:3168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2568 -s 5804⤵
- Program crash
PID:1880
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5Oq5Cw4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5Oq5Cw4.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7B6A.tmp\7B6B.tmp\7B6C.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5Oq5Cw4.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffb44b646f8,0x7ffb44b64708,0x7ffb44b647185⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,17406052459085934285,4840562130576059936,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:25⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,17406052459085934285,4840562130576059936,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,17406052459085934285,4840562130576059936,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:85⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17406052459085934285,4840562130576059936,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:15⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17406052459085934285,4840562130576059936,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:15⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17406052459085934285,4840562130576059936,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:15⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,17406052459085934285,4840562130576059936,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:85⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,17406052459085934285,4840562130576059936,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:85⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17406052459085934285,4840562130576059936,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:15⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17406052459085934285,4840562130576059936,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:15⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17406052459085934285,4840562130576059936,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:15⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17406052459085934285,4840562130576059936,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:15⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,17406052459085934285,4840562130576059936,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 /prefetch:25⤵PID:1520
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login4⤵
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffb44b646f8,0x7ffb44b64708,0x7ffb44b647185⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,14368383623343075584,16402008005689090338,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:25⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,14368383623343075584,16402008005689090338,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2652
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3096 -ip 30961⤵PID:680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3076 -ip 30761⤵PID:1620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2568 -ip 25681⤵PID:3652
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1776
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3268
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e0811105475d528ab174dfdb69f935f3
SHA1dd9689f0f70a07b4e6fb29607e42d2d5faf1f516
SHA256c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c
SHA5128374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852
-
Filesize
152B
MD547b2c6613360b818825d076d14c051f7
SHA17df7304568313a06540f490bf3305cb89bc03e5c
SHA25647a22bea2e7d0154c59bf5d8790ec68274eb05e9fa6cf0eab0d648121f1a02ac
SHA51208d2366fc1ce87dbe96b9bf997e4c59c9206fcfea47c1f17b01e79aeb0580f25cac5c7349bb453a50775b2743053446653f4129f835f81f4a8547ca392557aac
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\632a2201-3a56-43d9-9916-61be7e93890d.tmp
Filesize872B
MD5f193167b933c60e696cb8dff6564e8d7
SHA16a53f930eb39d5a8d6b19b7a6e0ac207c5f9c4b5
SHA256b64cb398bcb853dde921303d77965e2c242a5f593303fd6cd42cadf1315c60da
SHA512440b9a70b3be8c05a58dc75fc78d3bd178806d0c5d7a5f2a30f899cd48689bf4202008e920fe9bc7d49a6e706b6fb199499f34641c09c1e1b05337e2d5be7a23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize960B
MD5df29ec076fc47c2b1c130d17e6226a90
SHA19bad2001401ba31c4653e866b239a551d635e403
SHA256e69807eb8e59bfc7c643d569b3251d8c1bd982ac7d04b769b8bfb92ee1cfcd12
SHA512d03da052dd50426f7f4c1a6b62177fbd989222be5e62fba62d8012218f60b1048807f1fc8a0e7d04a284b4e86f40b14a8792dd19768c1856d3b80548fde6e40f
-
Filesize
1KB
MD5ca02ebfda1b59ddc753768fdff93f447
SHA1e8748b337665d75b1cd93f5491478e7144e709d8
SHA25667738f9c315d9efd17a952f0f400cf76fec8be52d635dbd6a1a7f878d9350790
SHA5126528405adfcd5ceee6d3f80390f55e29dc288e6aa798ec2382d5e423f25d9756f19a7f2bea8c2e859d29a5065479d51b9c5097e8459ee950ce08be34c66e4c3d
-
Filesize
1KB
MD5e6bbf18f0134273db8e2afc637f6c66f
SHA13133ec6bc4911b7edda48366ae88bf917275a339
SHA2560423ad0107622a01f8db1123123519957d9a30c4439a101641e027c49b69f3ff
SHA51216aa0e60b7fa3a71b683dd1010323d8f783ad20676100f895ae0bd0f1ff842d867e53a92a7350a4da59be9ac765791d11d46dcf10532eebc526df8a1bd6bbe76
-
Filesize
6KB
MD51afe9ca704b18b6e08136243d5b7bf4a
SHA145f7ec9192105a0cb0c37d94f50ff9a190c051ac
SHA256b2cbe382e79da3ec3e74d77dd68a7c5037ae91473c5a99baed1941a97941f383
SHA51268779a8d9ada1f09a56aa231a30ae3071fd940cdb9130bfd876195b4f5efde9a319dc03d6de7992cf317fc64f0c0f1df41233c20b4024494e14a8839a3e52065
-
Filesize
7KB
MD54c80dd6f0ecd58dbb6abc2fdb4024d1f
SHA114d5cad332d730fec3f270f357ff03ef05b93274
SHA256e69a024917207ef189c800526006d0fb04bbbb72ca57ee2c32132c7498f5f98e
SHA51254f0acdf2f3066ca729cd7a936fc22dec6c92812f7c841d1fd4b5cf42e87758826ed8af96841a1dd8d78880d2dcabd9f05bd17f46bbb3a0b11ecb757ec04ba04
-
Filesize
872B
MD5e00ed7f89b3eb4677c4e5f9491fb9d9b
SHA1d293dc96438b3250b8c97e72032c37194931c201
SHA2560a64b381f4f61240ac50f94d71b056d60c5ddd2301ec8970eed45f967ee90f16
SHA512ded993ce55973d979937f102fc7dbecda06186d59b74b1455375d958874b2a46373e93e008869d21bc1cbb4631deab2af248b5f1b542cd844a8aa604e8e88fc6
-
Filesize
872B
MD57968a49e29c9e454ab0f0986b0ee6dfb
SHA1421776854b244d13cd4671c39d81a6663caa5485
SHA25627d909aa12032bc29fa237ed88fca7863b94e86ef632b932101c2ea786b7720d
SHA512cf0ceb85674a63a1954a5d20aa1b5a633cf74f0e8af0a250421b0dc5ff3ce7866b099a4cee270980e9571717760604dce3df1f212a812447ca14011cd96879de
-
Filesize
872B
MD51e9c39b80b88e3a5a1224fc3e826c3c1
SHA1651eee65b8190107cf358098ba6917550ebd46be
SHA2565ddaf7236e83a7647796ea99e83d67cb30138e4e4cbe9a8488a6f2fb5a8149ed
SHA51260ec31222e4758d6dfbb672ca551fe488935a36675fa939c14d2595bbe87a9612bba25def590941717accb6c1525bb96b3fc8f34ed33abd02c6666d250764534
-
Filesize
872B
MD52ac0a8065c8b5c15e23c0b3e087bad2c
SHA1ab37fa0f8dd6ae07f78154ec51af1572f14ebd51
SHA2563542ce57d474356a3b5f8b2f6111a78d1eabcd29bf71f74282f7db7eda206d45
SHA51210101ef0df02feb5590f2163df30285fbf51d1c43acfad7854082b32f2770c5e30f2d67a0f7e4f6a2a4be9989bafc9da9c51f59fdcbcf47ba15a5b7c9d5bd5ef
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5718b19ea307f5a2e9a3b07937ee634b9
SHA159b4705e497e1481bbf0e23351d834e39396e289
SHA256bcaf492bf190ce6f462f673829d0ac2c619148dd8b262583c9786e6c5cedd24b
SHA512656585bb14341af8cb5bd48eaad65514e6658810e80450bf4d5cab52799bdebccc5a2aa1497fc1e8045ef70d9673065fc04e5adde291d18b78e39969a714b024
-
Filesize
8KB
MD5b37c24a232cc4b084982a8130425c77b
SHA1d4226ea4e3424a412545db3c43af70c4d105f5b2
SHA2564a11a61836d88c91e35c552e2214ffd4d4fc17ec3c3248e5efc76ccd91ed1769
SHA512183618748e000ce918e7a388833588dce5ee20b5ee229e6c99eae04add786ede2a22474bc1a562a462197eb3130a846aaaf9b138d1f0d525bd99dd0975e27bd0
-
Filesize
88B
MD50ec04fde104330459c151848382806e8
SHA13b0b78d467f2db035a03e378f7b3a3823fa3d156
SHA2561ee0a6f7c4006a36891e2fd72a0257e89fd79ad811987c0e17f847fe99ea695f
SHA5128b928989f17f09282e008da27e8b7fd373c99d5cafb85b5f623e02dbb6273f0ed76a9fbbfef0b080dbba53b6de8ee491ea379a38e5b6ca0763b11dd4de544b40
-
Filesize
98KB
MD529fbfb5da410790732984a28b80d9ac4
SHA1f19082941a93293506b5f04d02e4cd30d01311d9
SHA256bac7503df2870d135d889b0eb0c8924fd576005049f9db666b8fffb701784c32
SHA5121d325e066f2efdac74c3751b7a5a03695a6651132115110456afc37d8cd3e2472492f4d3542d9659c384d88391aa71396d2cf3b0f5110046f8a1798a44827fc7
-
Filesize
1.1MB
MD5bc7c8d47f06f688baa041b0ee4db56af
SHA18d3acfe0b49b48c1ba625ad9f1c776fab6a4ac1e
SHA256e967250d3c2f2fbab2743f2509720d8e2d19c904fe4eb596c5afa35d5d074402
SHA512a3478ba6550cfef291645a4750854f328dd50d6e1aac8e475e34b6aaabbfdd75aa1fa9bc96003b6e2881db0ee51fe7fa8bb9e2c7f41e570c1914718bb76ee268
-
Filesize
1.1MB
MD56fc1706a2c5bc1a49a95977d96aa54d3
SHA11333c39a85857d5e51fc401bd1991c8ed43ef4c4
SHA256750b2ba4d77d45fb62e36bc07ac69f3952e2898cda0b7ea4ad6d40eaaf43ecbd
SHA5129324cac4681760db9e4757fe514d9da4a542cc75a3ecef67625281e25a6e0e7ea807473f35c92dd099b374eeb25f3cceb2f2c1dbeb39ddf21a7b823026e331dc
-
Filesize
691KB
MD5664894c86fe2576fa2872973a9516cc5
SHA1976cf0dd97e161f7de97c60b39ef1bcdb98281d0
SHA256aba300624f6c7d7501f06d33a7e63ee8cf89b71654bdc5182ff5387584444163
SHA5120c7202054f5f2574da3c33fd59a739cdbb8fecbd7a80e50482befb7ff40b03b26307fd0ff3bd96f310e10302eba76bc703919d7317a572c4024fa06977db71e3
-
Filesize
896KB
MD51b5e148a38e0ed1d5903cf200c49b698
SHA1d36733f237915312cbb8e59d8da02f33489181f7
SHA256067a1f055298e6e00ed57504a2a576124a301c9c2237d9ca8740d23a89c6f6d3
SHA5124405ea1bbab9e7c802c20619892cb6a7c213c9c898fc14b87b435f3eb7588d540e134edcdd87551992b67d25e4bbbe1d83013c54c9eeea2b710b5c1859d71fc7
-
Filesize
330KB
MD52aa8eb4806b11a059e7dce80154966de
SHA13b4df1a5cdddfd3e4ff752b3f3b4e33f4bd0492f
SHA25621d3d29f819579ba5e813c793026899c80bb3efdc75186cb7d6d351deb6a24e7
SHA512de34710ad7ae76259747d7d96b63254aec259486057a0711540f43e51c303f9d5d03ebf27d4bd114704248a607774f81f44dbe590de902f0d73e09fa2f900cea
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
180KB
MD53f305144feb3040cf41b216841537ec2
SHA1ae9066cc3b40be6250e7e6a90bcc2de160067b84
SHA25689fec546032f1fc58fb08e79ab626d7e2401a5958b81a928ab5e0c1540e180b1
SHA512ca3993ad5d0a376809e304a49eaf81c8ba3ecbe40e7085573698b1870291034f9bbfdec552b640b32d92b2f0b359f33c40f694f401abaf81d70ab7a6484a798e