Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2024 13:37
Static task
static1
Behavioral task
behavioral1
Sample
d9aeba44fd243f348a360f2a92265ff08c698b52b489fdde0bf879770acc38f4.exe
Resource
win10v2004-20240319-en
General
-
Target
d9aeba44fd243f348a360f2a92265ff08c698b52b489fdde0bf879770acc38f4.exe
-
Size
1.5MB
-
MD5
f3cd6bba4c29ed1c18b64abeb4e7b5d6
-
SHA1
b021ab8bb5818ea679feca49aaeb134a735a8982
-
SHA256
d9aeba44fd243f348a360f2a92265ff08c698b52b489fdde0bf879770acc38f4
-
SHA512
3881ad760075d5fc765154095b2cf33c6b873bf2a0bab26f3a5815f8ce74f98d5f38500684d5541b553eeeb7607ddad0dcabcc01d531645916d28784d8af5e40
-
SSDEEP
49152:b9oWtgy13P2xA/bJOByk2SfIfKsMfTtUIEw4Gr:5oupP2xADJOByoQfKsMr6j
Malware Config
Extracted
redline
grome
77.91.124.86:19084
Extracted
amadey
3.89
http://77.91.124.1
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
-
url_paths
/theme/index.php
Signatures
-
Detect Mystic stealer payload 5 IoCs
resource yara_rule behavioral1/memory/3632-47-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral1/memory/3632-48-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral1/memory/3632-49-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral1/memory/3632-51-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral1/files/0x0007000000023349-80.dat mystic_family -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/776-60-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation 5fz3es5.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation 7rh1LM04.exe -
Executes dropped EXE 15 IoCs
pid Process 5092 RG2aA85.exe 4388 Ur9dw34.exe 4788 ca6bB94.exe 2916 hI7ot99.exe 2216 iF5dw77.exe 1392 1ip14dv4.exe 1844 2zS4859.exe 2944 3WE90JK.exe 3328 4TU265HS.exe 2296 5fz3es5.exe 4780 explothe.exe 5104 6lk4BG5.exe 5040 7rh1LM04.exe 6084 explothe.exe 4572 explothe.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" iF5dw77.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d9aeba44fd243f348a360f2a92265ff08c698b52b489fdde0bf879770acc38f4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" RG2aA85.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Ur9dw34.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ca6bB94.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" hI7ot99.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1392 set thread context of 2816 1392 1ip14dv4.exe 102 PID 1844 set thread context of 3632 1844 2zS4859.exe 104 PID 3328 set thread context of 776 3328 4TU265HS.exe 115 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4212 3632 WerFault.exe 104 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3WE90JK.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3WE90JK.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3WE90JK.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3520 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-817259280-2658881748-983986378-1000\{D25FF8C9-C39C-4C1D-BDD2-09C4D4A874A9} msedge.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2816 AppLaunch.exe 2816 AppLaunch.exe 2816 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2816 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1396 wrote to memory of 5092 1396 d9aeba44fd243f348a360f2a92265ff08c698b52b489fdde0bf879770acc38f4.exe 95 PID 1396 wrote to memory of 5092 1396 d9aeba44fd243f348a360f2a92265ff08c698b52b489fdde0bf879770acc38f4.exe 95 PID 1396 wrote to memory of 5092 1396 d9aeba44fd243f348a360f2a92265ff08c698b52b489fdde0bf879770acc38f4.exe 95 PID 5092 wrote to memory of 4388 5092 RG2aA85.exe 97 PID 5092 wrote to memory of 4388 5092 RG2aA85.exe 97 PID 5092 wrote to memory of 4388 5092 RG2aA85.exe 97 PID 4388 wrote to memory of 4788 4388 Ur9dw34.exe 98 PID 4388 wrote to memory of 4788 4388 Ur9dw34.exe 98 PID 4388 wrote to memory of 4788 4388 Ur9dw34.exe 98 PID 4788 wrote to memory of 2916 4788 ca6bB94.exe 99 PID 4788 wrote to memory of 2916 4788 ca6bB94.exe 99 PID 4788 wrote to memory of 2916 4788 ca6bB94.exe 99 PID 2916 wrote to memory of 2216 2916 hI7ot99.exe 100 PID 2916 wrote to memory of 2216 2916 hI7ot99.exe 100 PID 2916 wrote to memory of 2216 2916 hI7ot99.exe 100 PID 2216 wrote to memory of 1392 2216 iF5dw77.exe 101 PID 2216 wrote to memory of 1392 2216 iF5dw77.exe 101 PID 2216 wrote to memory of 1392 2216 iF5dw77.exe 101 PID 1392 wrote to memory of 2816 1392 1ip14dv4.exe 102 PID 1392 wrote to memory of 2816 1392 1ip14dv4.exe 102 PID 1392 wrote to memory of 2816 1392 1ip14dv4.exe 102 PID 1392 wrote to memory of 2816 1392 1ip14dv4.exe 102 PID 1392 wrote to memory of 2816 1392 1ip14dv4.exe 102 PID 1392 wrote to memory of 2816 1392 1ip14dv4.exe 102 PID 1392 wrote to memory of 2816 1392 1ip14dv4.exe 102 PID 1392 wrote to memory of 2816 1392 1ip14dv4.exe 102 PID 2216 wrote to memory of 1844 2216 iF5dw77.exe 103 PID 2216 wrote to memory of 1844 2216 iF5dw77.exe 103 PID 2216 wrote to memory of 1844 2216 iF5dw77.exe 103 PID 1844 wrote to memory of 3632 1844 2zS4859.exe 104 PID 1844 wrote to memory of 3632 1844 2zS4859.exe 104 PID 1844 wrote to memory of 3632 1844 2zS4859.exe 104 PID 1844 wrote to memory of 3632 1844 2zS4859.exe 104 PID 1844 wrote to memory of 3632 1844 2zS4859.exe 104 PID 1844 wrote to memory of 3632 1844 2zS4859.exe 104 PID 1844 wrote to memory of 3632 1844 2zS4859.exe 104 PID 1844 wrote to memory of 3632 1844 2zS4859.exe 104 PID 1844 wrote to memory of 3632 1844 2zS4859.exe 104 PID 1844 wrote to memory of 3632 1844 2zS4859.exe 104 PID 2916 wrote to memory of 2944 2916 hI7ot99.exe 106 PID 2916 wrote to memory of 2944 2916 hI7ot99.exe 106 PID 2916 wrote to memory of 2944 2916 hI7ot99.exe 106 PID 4788 wrote to memory of 3328 4788 ca6bB94.exe 107 PID 4788 wrote to memory of 3328 4788 ca6bB94.exe 107 PID 4788 wrote to memory of 3328 4788 ca6bB94.exe 107 PID 3328 wrote to memory of 5012 3328 4TU265HS.exe 114 PID 3328 wrote to memory of 5012 3328 4TU265HS.exe 114 PID 3328 wrote to memory of 5012 3328 4TU265HS.exe 114 PID 3328 wrote to memory of 776 3328 4TU265HS.exe 115 PID 3328 wrote to memory of 776 3328 4TU265HS.exe 115 PID 3328 wrote to memory of 776 3328 4TU265HS.exe 115 PID 3328 wrote to memory of 776 3328 4TU265HS.exe 115 PID 3328 wrote to memory of 776 3328 4TU265HS.exe 115 PID 3328 wrote to memory of 776 3328 4TU265HS.exe 115 PID 3328 wrote to memory of 776 3328 4TU265HS.exe 115 PID 3328 wrote to memory of 776 3328 4TU265HS.exe 115 PID 4388 wrote to memory of 2296 4388 Ur9dw34.exe 136 PID 4388 wrote to memory of 2296 4388 Ur9dw34.exe 136 PID 4388 wrote to memory of 2296 4388 Ur9dw34.exe 136 PID 2296 wrote to memory of 4780 2296 5fz3es5.exe 118 PID 2296 wrote to memory of 4780 2296 5fz3es5.exe 118 PID 2296 wrote to memory of 4780 2296 5fz3es5.exe 118 PID 5092 wrote to memory of 5104 5092 RG2aA85.exe 119 PID 5092 wrote to memory of 5104 5092 RG2aA85.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9aeba44fd243f348a360f2a92265ff08c698b52b489fdde0bf879770acc38f4.exe"C:\Users\Admin\AppData\Local\Temp\d9aeba44fd243f348a360f2a92265ff08c698b52b489fdde0bf879770acc38f4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RG2aA85.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RG2aA85.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ur9dw34.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ur9dw34.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ca6bB94.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ca6bB94.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\hI7ot99.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\hI7ot99.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\iF5dw77.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\iF5dw77.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1ip14dv4.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1ip14dv4.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2zS4859.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2zS4859.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:3632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 5409⤵
- Program crash
PID:4212
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3WE90JK.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3WE90JK.exe6⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:2944
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4TU265HS.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4TU265HS.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:5012
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:776
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5fz3es5.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5fz3es5.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
PID:4780 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:3520
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:4220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:860
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:4652
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:4352
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4028
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:1756
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:3512
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6lk4BG5.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6lk4BG5.exe3⤵
- Executes dropped EXE
PID:5104
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7rh1LM04.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7rh1LM04.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:5040 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\A374.tmp\A375.tmp\A376.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7rh1LM04.exe"3⤵PID:4164
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login4⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/4⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/4⤵PID:1084
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3632 -ip 36321⤵PID:4164
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=3788 --field-trial-handle=2244,i,11986678581565715302,451159359636456336,262144 --variations-seed-version /prefetch:11⤵PID:2296
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=3104 --field-trial-handle=2244,i,11986678581565715302,451159359636456336,262144 --variations-seed-version /prefetch:11⤵PID:4976
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=760 --field-trial-handle=2244,i,11986678581565715302,451159359636456336,262144 --variations-seed-version /prefetch:81⤵PID:5092
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=5456 --field-trial-handle=2244,i,11986678581565715302,451159359636456336,262144 --variations-seed-version /prefetch:11⤵PID:2984
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --mojo-platform-channel-handle=4720 --field-trial-handle=2244,i,11986678581565715302,451159359636456336,262144 --variations-seed-version /prefetch:11⤵PID:5004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --mojo-platform-channel-handle=6028 --field-trial-handle=2244,i,11986678581565715302,451159359636456336,262144 --variations-seed-version /prefetch:11⤵PID:5084
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6304 --field-trial-handle=2244,i,11986678581565715302,451159359636456336,262144 --variations-seed-version /prefetch:81⤵PID:2004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --mojo-platform-channel-handle=6456 --field-trial-handle=2244,i,11986678581565715302,451159359636456336,262144 --variations-seed-version /prefetch:81⤵PID:1500
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=6608 --field-trial-handle=2244,i,11986678581565715302,451159359636456336,262144 --variations-seed-version /prefetch:81⤵
- Modifies registry class
PID:3944
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6300 --field-trial-handle=2244,i,11986678581565715302,451159359636456336,262144 --variations-seed-version /prefetch:81⤵PID:5208
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=6744 --field-trial-handle=2244,i,11986678581565715302,451159359636456336,262144 --variations-seed-version /prefetch:81⤵PID:5948
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:6084
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:4572
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
632B
MD5401dcacea4acfc09e8774cd0fcf16129
SHA1ae03b7999297b5383785eddc4f6194fd4c80e149
SHA2561d5c24e97e32d5e4aefe29c6a84df664e67a2db5da7a6d138e5084a60a7bb0e6
SHA5127c423d05b9ea04a06614037c9e28f3da27fbb95daefd14450cabb35a6abf546b1a6585c1bcd07a66a3d02f967fa1774c9cb09b5520a53b2f90e0ed1cedae3dc5
-
Filesize
87KB
MD592b82c490c282bf2b09268be9b629732
SHA114c07fab8aca1f8f41936f1217478a25beabe3a8
SHA2561f4ee8b00682f5dd5bf0c95162897566ba5ca1c4443cb252c7559687f3b78273
SHA51274f70859a2c9372eb079518a9ed2261180263542213d87ff9911926d282f87548e8f48ecd550e574992907e23597b6ca1bcd2438cc6796b49588a2a93720b27d
-
Filesize
1.4MB
MD52e20a2d7c6194a7cbbdda4d9452bfa03
SHA1bdf07ff1bc943028fa77f68edcee9af66605cd5f
SHA25634146b4c86a617d559fb0012ff0f5afd04927a97143affa9419ea71e5411f061
SHA512037de372946426dbbf019a01f171b39eb67544a620188a6b0735233f8e57dda0e23a9f4765df5bec28ad7a8c5de7dc9ed420f09b2784d809238286a1265ddeda
-
Filesize
182KB
MD52eae4f217dafb0e02f5d37c44ae2a652
SHA1414b9875eff592c656038f38ddcb12e8064f744a
SHA2569598973b13a014ad884b46c7494a0392a36270e62a365803f9eb1438b2c19f4e
SHA5124aac7e26b26223cb201b5e5fb581c1e2eb32f8877a1eab582e181695e0503be4a4e545aa326dc112e7deafc1ef2db2c7c1ed1968339cc89b96f2f1110aa637ab
-
Filesize
1.2MB
MD5121aa508cbaf7060c64667863c8e9389
SHA1fdeaba571f6e72d4fdb77631579f6d9bf5356f18
SHA25695036dd4a2fc22e08a063ee05b13441b1a9df0d93ef4646c16574f7c460eac3e
SHA5124ced304e8f2c4662a216a8fa2a36f42ebfbb6fe4f9d05d273f111943ee00a0941ab3878ec5d04cfac688ad4149bdacfb8cc729da9ba43cd3c16f13c64b5eb529
-
Filesize
219KB
MD5f65f417183727d8ef72b19a7ba3435c9
SHA11ba33b32beb0c119eed2ce54d16a92342577f37a
SHA25632c97705475e244c65dff0254525ab7847555bf05082db2395f05db2e125bccf
SHA512abe8a29652953dba6b86516890eb0253ef6bae0aed39b92010873ac25154246acd1dec5858036015430d8ca27fe91031b6ba031d0488cce396d1cdf539a7fd0a
-
Filesize
1.0MB
MD54703ba737b5cdb5519cfe63d74fb3dbc
SHA121096b4f846b4d7aec36fe953de2007d27d33db1
SHA256a53869996516adfd7af5610a409584618d747d1386139e632eebd84df93ea612
SHA51246a42fb2aa810d07cb4048cecc555f8bbb1d13cebf9d486011f5e8f53369fd72e522fce28aaf09a4581ea70e6044eac97cb1b4b2ab73d7a70bc2781815750e90
-
Filesize
1.1MB
MD5a4865323ef36cd164e7a023f917433ff
SHA1ca2e62e99540d345da483514c50edd4af13705e4
SHA2566a42355d8aa58d2cc8c78092d4ff0da6ef3293674ae518e15c71d1ae10cd1c67
SHA512575b0cd897c88af2e03897f67123e3ecdfe8c0eb6cbce87d603520a1d748f231792210671d950ed900858bb0f84e8a9770030d96f3ed69d7964e566a357eebba
-
Filesize
647KB
MD5160a38e156d9d16c2842f119ad0acb7b
SHA1137cb4df3f0a3a711bb24841585f81bbfff781c1
SHA256a4a88dd47fb2c0d47afc4cd467cd98b775329552d605d92a369e8a192600a5d8
SHA512fbcbe0437f1c5a1b2f32a0ff716c3701fc577df48267fdb6c85925ba750cd006723f8716fea1a547edd9bb932bb00589013f9cf026475ca6798c271f278d6077
-
Filesize
30KB
MD52f9257e7bc6fb693d58e213784b509f1
SHA1dfb07e903b57d6b26c219f31c3c229e316425899
SHA25636c7928fd1c4f637fb4ebb75c5e491ec990d608bcb07adf59644947e46e21150
SHA512fc37f43d513b8a719a9fe276f5a084aeefd6ab6e3597d1279bdedc11805c9e1dce956d1818d7c9aa5143b71a7d0de2c6b4cca2ba09ed10de3165314320e87ac5
-
Filesize
522KB
MD5dcadef184d3ca1c2568441d3b0b06b12
SHA1c7ed42bcc082a3b1f5fb254185b603cf948022b7
SHA2562e38b54b82570e519260902146b594aff77a694e956d49e6cf93ddb466163fad
SHA512dcf3b732b916c1b518c01267cfc330988ad5f5f24646c4b43dbcf488a4c76e417eb9033728d1579eff70bbf63a4411729a0bebd4cf24c2360cd8d16c5efb883b
-
Filesize
893KB
MD50e56e59513a4b1d1eb512e8187ec7ab0
SHA1992bf232b6fe1c8e363818191c267f7ce9a435e9
SHA256bd2bfabee2939f8bca5de7472b0fc90b6ca02f0a1db275b0970b32a53159ea5d
SHA51293c4e5da3877442774658a5f516447c8debe2490a969cafea145e67d0572ee0f8c7d3031c588a04d42aa1b769bf5661f31086986c4a0180393b08dd8f9c34241
-
Filesize
1.1MB
MD592d270ad52299d83b23749f1307822b8
SHA1bf40dba809684b1f4994e52c057c2579cf943b05
SHA25636c4eed0f2893a3326ae8c2a20e85000356a95c67e0dafd7093b19619d6c8f0f
SHA5121e296b8531aa153461c0de6e401276815efcfee0f66a031ce718d634b771476b25b38fbfdc006a17af27368ee7b06f60ea4a1de156eb21e693f7a24069438828
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5