Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
162s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/04/2024, 08:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://google.se/
Resource
win11-20240221-en
General
-
Target
https://google.se/
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\winnt32.exe" NoEscape.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NoEscape.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-160263616-143223877-1356318919-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" NoEscape.exe -
Loads dropped DLL 1 IoCs
pid Process 2412 vc_redist.x86.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Desktop\desktop.ini NoEscape.exe File opened for modification C:\Users\Public\Desktop\desktop.ini NoEscape.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-160263616-143223877-1356318919-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\noescape.png" NoEscape.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\winnt32.exe NoEscape.exe File opened for modification C:\Windows\winnt32.exe NoEscape.exe File created C:\Windows\winnt32.exe\:Zone.Identifier:$DATA NoEscape.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "212" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-160263616-143223877-1356318919-1000\{2DEA6637-545A-4FAD-A129-86DAAAC349ED} msedge.exe Key created \REGISTRY\USER\S-1-5-21-160263616-143223877-1356318919-1000_Classes\Local Settings msedge.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\NoEscape.exe.zip:Zone.Identifier msedge.exe File created C:\Windows\winnt32.exe\:Zone.Identifier:$DATA NoEscape.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2940 msedge.exe 2940 msedge.exe 1812 msedge.exe 1812 msedge.exe 4504 msedge.exe 4504 msedge.exe 4756 identity_helper.exe 4756 identity_helper.exe 3924 msedge.exe 3924 msedge.exe 2280 msedge.exe 2280 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
pid Process 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe -
Suspicious use of SendNotifyMessage 28 IoCs
pid Process 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1812 wrote to memory of 3096 1812 msedge.exe 79 PID 1812 wrote to memory of 3096 1812 msedge.exe 79 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 1752 1812 msedge.exe 80 PID 1812 wrote to memory of 2940 1812 msedge.exe 81 PID 1812 wrote to memory of 2940 1812 msedge.exe 81 PID 1812 wrote to memory of 2072 1812 msedge.exe 82 PID 1812 wrote to memory of 2072 1812 msedge.exe 82 PID 1812 wrote to memory of 2072 1812 msedge.exe 82 PID 1812 wrote to memory of 2072 1812 msedge.exe 82 PID 1812 wrote to memory of 2072 1812 msedge.exe 82 PID 1812 wrote to memory of 2072 1812 msedge.exe 82 PID 1812 wrote to memory of 2072 1812 msedge.exe 82 PID 1812 wrote to memory of 2072 1812 msedge.exe 82 PID 1812 wrote to memory of 2072 1812 msedge.exe 82 PID 1812 wrote to memory of 2072 1812 msedge.exe 82 PID 1812 wrote to memory of 2072 1812 msedge.exe 82 PID 1812 wrote to memory of 2072 1812 msedge.exe 82 PID 1812 wrote to memory of 2072 1812 msedge.exe 82 PID 1812 wrote to memory of 2072 1812 msedge.exe 82 PID 1812 wrote to memory of 2072 1812 msedge.exe 82 PID 1812 wrote to memory of 2072 1812 msedge.exe 82 PID 1812 wrote to memory of 2072 1812 msedge.exe 82 PID 1812 wrote to memory of 2072 1812 msedge.exe 82 PID 1812 wrote to memory of 2072 1812 msedge.exe 82 PID 1812 wrote to memory of 2072 1812 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://google.se/1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffaf7e3cb8,0x7fffaf7e3cc8,0x7fffaf7e3cd82⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1932,8104280908348782785,275721451239741590,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1928 /prefetch:22⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1932,8104280908348782785,275721451239741590,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1932,8104280908348782785,275721451239741590,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,8104280908348782785,275721451239741590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,8104280908348782785,275721451239741590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,8104280908348782785,275721451239741590,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4460 /prefetch:12⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,8104280908348782785,275721451239741590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3840 /prefetch:12⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,8104280908348782785,275721451239741590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,8104280908348782785,275721451239741590,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,8104280908348782785,275721451239741590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1932,8104280908348782785,275721451239741590,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4916 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,8104280908348782785,275721451239741590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2756 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,8104280908348782785,275721451239741590,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2880 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,8104280908348782785,275721451239741590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6384 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,8104280908348782785,275721451239741590,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6172 /prefetch:12⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,8104280908348782785,275721451239741590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6364 /prefetch:12⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1932,8104280908348782785,275721451239741590,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6804 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1932,8104280908348782785,275721451239741590,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5756 /prefetch:82⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1932,8104280908348782785,275721451239741590,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5020 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,8104280908348782785,275721451239741590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,8104280908348782785,275721451239741590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2756 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,8104280908348782785,275721451239741590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1656 /prefetch:12⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,8104280908348782785,275721451239741590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6188 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1932,8104280908348782785,275721451239741590,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6948 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,8104280908348782785,275721451239741590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=216 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1932,8104280908348782785,275721451239741590,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵PID:1228
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xe0,0x10c,0x7fffaf7e3cb8,0x7fffaf7e3cc8,0x7fffaf7e3cd82⤵PID:4612
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4656
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:128
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4680
-
C:\Users\Admin\Desktop\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe"C:\Users\Admin\Desktop\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Disables RegEdit via registry modification
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- NTFS ADS
PID:4460
-
C:\Users\Admin\Desktop\NoEscape.exe\NoEscape.exe-Latest Version\vc_redist.x86.exe"C:\Users\Admin\Desktop\NoEscape.exe\NoEscape.exe-Latest Version\vc_redist.x86.exe"1⤵PID:788
-
C:\Users\Admin\Desktop\NoEscape.exe\NoEscape.exe-Latest Version\vc_redist.x86.exe"C:\Users\Admin\Desktop\NoEscape.exe\NoEscape.exe-Latest Version\vc_redist.x86.exe" -burn.unelevated BurnPipe.{8335C205-302A-45CE-A045-8AF25E6FCA87} {CF966A74-0244-4D40-A402-1482D5AB916D} 7882⤵
- Loads dropped DLL
PID:2412
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3956055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
PID:3264
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD55c48e8b68231fb5b2d7f1188b930bc0e
SHA11822aef5da8fdd47626fb91afcf79a2be175a325
SHA256c3b287c29eaa57166b2ab1ba9bd0aaced13cc2f946a04b8d708ac429187fe944
SHA5122bd09b83e44e0104fbe080a8573690217dc9fbf7fd59ff25a1a9e9ebd2d87ac533f9b99350773d081a7e748b39657115a13e94538b153bceb13ecdfc4672a0f8
-
Filesize
152B
MD5f2dc80f5403feb8461b7ffa09890d6a0
SHA1d5b61e6d672e7e71571e0132e21cead181da8805
SHA256eadeadba37eed18e5acba408d7e076270b00403fed372b77164577232232428a
SHA5125e2119529b99b76be105c43714e4b9977ee2147172c1c44e92bd9b41fa7a66f55d4073c864aac668a912aff2898bd216fb38f2fe34ef65de69ad12965218caf5
-
Filesize
35KB
MD54edc02d46b29927fafd72cb2ad7a6b9d
SHA116dafc8c2e044fe1a25500a8174b0c8943fc0d2a
SHA2563a28ba1610a0fb87e08f7b7aaa04e3214dd106e907829747a8047d1a24938d14
SHA51215d7a05b9a57c750afac08e96cef2c8e76297a553051e2cd4a3561b0150b7a0d89282b78d28b456e09e1a2744f64270477a15fe51f9a1dcece6f36f43a2991db
-
Filesize
69KB
MD5aac57f6f587f163486628b8860aa3637
SHA1b1b51e14672caae2361f0e2c54b72d1107cfce54
SHA2560cda72f2d9b6f196897f58d5de1fe1b43424ce55701eac625e591a0fd4ce7486
SHA5120622796aab85764434e30cbe78b4e80e129443744dd13bc376f7a124ed04863c86bb1dcd5222bb1814f6599accbd45c9ee2b983da6c461b68670ae59141a6c1a
-
Filesize
19KB
MD52e86a72f4e82614cd4842950d2e0a716
SHA1d7b4ee0c9af735d098bff474632fc2c0113e0b9c
SHA256c1334e604dbbffdf38e9e2f359938569afe25f7150d1c39c293469c1ee4f7b6f
SHA5127a5fd3e3e89c5f8afca33b2d02e5440934e5186b9fa6367436e8d20ad42b211579225e73e3a685e5e763fa3f907fc4632b9425e8bd6d6f07c5c986b6556d47b1
-
Filesize
64KB
MD5d6b36c7d4b06f140f860ddc91a4c659c
SHA1ccf16571637b8d3e4c9423688c5bd06167bfb9e9
SHA25634013d7f3f0186a612bef84f2984e2767b32c9e1940df54b01d5bd6789f59e92
SHA5122a9dd9352298ec7d1b439033b57ee9a390c373eeb8502f7f36d6826e6dd3e447b8ffd4be4f275d51481ef9a6ac2c2d97ef98f3f9d36a5a971275bf6cee48e487
-
Filesize
65KB
MD556d57bc655526551f217536f19195495
SHA128b430886d1220855a805d78dc5d6414aeee6995
SHA256f12de7e272171cda36389813df4ba68eb2b8b23c58e515391614284e7b03c4d4
SHA5127814c60dc377e400bbbcc2000e48b617e577a21045a0f5c79af163faa0087c6203d9f667e531bbb049c9bd8fb296678e6a5cdcad149498d7f22ffa11236b51cb
-
Filesize
84KB
MD574e33b4b54f4d1f3da06ab47c5936a13
SHA16e5976d593b6ee3dca3c4dbbb90071b76e1cd85c
SHA256535fc48679c38decd459ad656bdd6914e539754265244d0cc7b1da6bddf3e287
SHA51279218e8ee50484af968480ff9b211815c97c3f3035414e685aa5d15d9b4152682d87b66202339f212bf3b463a074bf7a4431107b50303f28e2eb4b17843991c2
-
Filesize
1.1MB
MD550d8e4ab1955e69ca300315a44b2c299
SHA1842445ed617a12ea2babca79b382fc0afaabf712
SHA25680df958a00069e03d11f0c57207b118c3130b2bd61482e317a4895f2a61c4793
SHA512b564a4c3b4c18351d1f1e0a55f5e5a79ba82dc24b81dcd192746521595c1c0dccba9dad74271697d054cacda98bf7149a0364c3edf55a0441395c3cd51c0606c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5d81d8f9d02eda05796db4804428d836a
SHA1d8b1c7fe2354cd54001feba8053c3c84c5e68790
SHA25634f566ecce373a3c3a0b93e4c3284ba40093469e6d2986b0dd3002e3584c13d5
SHA512dd1e1663dc9c5279048e514592ab13b8dff164c173c2032a2d3b503aa8ceacceb0b9d6b040c14274e13fb1f7aa35b1d9dee0a609c65d354f59c68bf12ef93ce3
-
Filesize
2KB
MD587a39a855dc8bcce243f3b90ed40c954
SHA10853dfa8c60a72c814a94fba5ee28c4b9a063c25
SHA256b41959d456331800269277cf47db20bfa15d8c1d40064c827b88ef934c8a2e02
SHA512c70b79225e5e7c55bff918cac264f7b61894f8107dfda4195cbd045e5a390861144f984305b4f44edcd08a07db82c56bab14906c0dc1ea2e780d267683a8904a
-
Filesize
2KB
MD5c19ffc65d459fe90e3539b9264429aa8
SHA14e3c86bf0671e1a0b9654117f21783573a8742ae
SHA25629ab3fc436876314a65208c9a75407bd117bd15f9e58e80cdb64bb5a9efa38e7
SHA512cf8e9b3ef8ae5fd656d510b546603a6985494060c49ae1bb9d16c006e1327bef05dfad13b7748a9a864198e9533ebe0abad5969ee0d38f8a212d64d1433072a1
-
Filesize
5KB
MD5ae0f4f0f36ffb6693f576b444bdb240c
SHA10f780cc4203203cbcbdb55b1a4e47e3fcae520a2
SHA256b8805fc7442f1be9bbfce9a530ef1deb3b67298864997a6caf57027eb3beb32a
SHA5121e73a2374c118e2f8f04f3936520aa2271f97a798d17f6d13ed5fb16185b114ba9117e6db414b51a8e85870f2e638d5b5d510092ade368a79af6a6658235ed56
-
Filesize
6KB
MD5b521032d4fa5576bcaa83dfb1d5310fc
SHA161989bfe78c6b8fd22e848fb50ef3971415c4906
SHA2561ff8f6411ef59c829391cef300e3832c040c630da913c51fc23abf49b8414079
SHA51252466c946086db1b86004e4e6baafd98eeacd045ce5de3c04d73345d1e431735d2f47f8904d68b92b49ec2d0dc6f8dec3d44775a6a7cfac0fd0316d0e6d3c88d
-
Filesize
6KB
MD5fcbc28a586a7be275d2dcbc13095e272
SHA1aa03849c8aa099cc204aa4666bef54d0e4a2b28a
SHA256104bf26380941180665ff4213686f024bf6136ff1ce9fc5a7bbf8d19b107bb17
SHA512443d9985166883c430d9d09c8dc660784a037b6318c734561ccf3e569950b26862bb2d1ea8caa0aaf6427dc227c432cb0e90ab2bc99f59e928dd6d8191340740
-
Filesize
6KB
MD58907b78e4499b64747658f301993f6ca
SHA140b03752e60e4c9d4eaa753bc071d17bba4c50c2
SHA25600d38e3611f2d1f74813274f945e69712dc1cc949d6ad6ff30d0447d537b6ca3
SHA5128d9352127c27ff2c76dc380f3b535c274cbf0f2ad5aef7d725666ff667a2a64f54abcc71f6c781526c024adef36d11ab121fed36edc9cd7a7bcded8f14a99d1f
-
Filesize
6KB
MD51d5636196b33c7c9b476eecf7d5df1ab
SHA12c9262f6584cc2c97b8a87289a4252569e0af625
SHA2568a5e1b35dafa8cb5b8d66f4bbfbda185e346eb9e360bb7d837aa7ebbb49cacd6
SHA512ce62ff46b8f7b38a70c9cc4d7a37b8f07ab2ceb996658fcbbfce848ec26a83d64cb99029ae19ec4860360666ad1e9bcb1f2462d1d0e6fc566c74a8e51ce0b1d7
-
Filesize
371B
MD58df73d85cd902edc067517edc228d507
SHA10f0a76d8a6c1c4492f71cf1b6941f6789ff86fc4
SHA2569b1e203b6c3b5e65a9bc7f573e3207cf5b8010aa80e53a4b01d5c94fa032c4d5
SHA5125fd4603e7e16c44aa6ddcd6044d986442388cf07aa080204bc2bab7d95fad4899feb92486dde370ce86a1ec43eabd3aed7c6f20bfe549ef8c1215dbf09d4cf6e
-
Filesize
1KB
MD5c1f592d603dd3fbb416bd9c7cf8fd892
SHA1a563b3de6c3427a93fa948c4d4fa5057749e4042
SHA256165288d69ac28dff391c2c5b8cbd355d053d73e4d1690f7c097d1073536432cc
SHA51288f07f1bfe25080fefb6a1572e6842ccdee0e3a23879abffc650e3ed265fe38b9da17657848b746c385728299b6e5bbb8cbc76af4beefefc195fe75b4729a18f
-
Filesize
1KB
MD58732d06eb4fbdc3bfc33211a81e1674b
SHA103080a1e64a350cabbc97c34d6060b52826c7005
SHA256c832bfcfb2f49bed3def6516f4d32cf40f4228c1d624ecdd4c59f30f7963c57f
SHA51238e743f979447de9cbd6506a3712981140d960bbe2218e79464ee1aab8a6290a0b3370b815e31d7f641448a68ac1b81c68c21109d2ca5d17bf36c8fccb28733d
-
Filesize
1KB
MD5c6eb2aa206e15d04cfce4d7000eb3dd3
SHA1e788c9f6cc96396e8107355c51343bce897067c9
SHA25651cbfce6941cddf408369f10865ea94136b05b0b5de02022125daa785d1679c7
SHA512f9d4d6e84b56c9da023ae0aa9c9c1e5bd0ecd87026bfc0a62fbbc2773c3fa2324b78d9d6e30809ec7bb77462b801c42a53025f3b9f5d2a305fd2b8459f6d13d9
-
Filesize
204B
MD598be825766e80e456d58b2a313cec94b
SHA198230a6cf89d57462f3530818409833a2cbb6e6a
SHA25687a1f80e4998fed46432680d0d89af0973fab3db668583c3c12e9fcbf20341c0
SHA512011cc8904fb259a6bffc9958d925046a7549fc572290c9618329c2abafaa610eae51ce45e7bb2e6f3d85e92673652f8effa0b3f26a5880e6335797b0c7b207bf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53a1f4d49ea0cd19c6e1d93bd867a035e
SHA14027bbfc27712608d63731ec3f4450b8686c2d66
SHA256b950a254398b41ce60d870b13584ce53bbdcfc7f9262080693e7084023e6e7be
SHA512eeafa5ec36fed947707c09a35acbb69eace3fc01f6840e9e5959ef7fed3f019057c8251bb521723c7292ee035ae9ccd643e976164ecdb4d8daeef1d02f0de2bf
-
Filesize
11KB
MD56e3cab306f1cddab40f5fc0e08a5bb6e
SHA186112976a7aace3e2cccb68d185a2f4c7125bb50
SHA256c15d7ccfb8135b936954d6263d702abc90b1466ad968f4505449540dc583daef
SHA512881a0bf712a4f0bfd3788bba04ad6a784087a05216bfe098985153e2bccb286be957238405ab3ecbe6962f53398aefd438624f4265441f1fbf9d5838c3546c71
-
Filesize
11KB
MD5458e178ff42e59bbe6bbc687c16b673b
SHA1fab8a4d0fa3fef0ed4ce45fceb091acbbdef2e7d
SHA2568b71241403e591dc8c5183055e833c4bffd46509b25a90fdd1c204c34dd6d9ff
SHA512f25980897bfbfd7c689989a1d4108c24b766d5b60bfaaf87b87c29cf8dfe5c31a8e24f8fb044af5069943890da4c58399dec9955bae913439c4a277f70022db9
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
118KB
MD54d20a950a3571d11236482754b4a8e76
SHA1e68bd784ac143e206d52ecaf54a7e3b8d4d75c9c
SHA256a9295ad4e909f979e2b6cb2b2495c3d35c8517e689cd64a918c690e17b49078b
SHA5128b9243d1f9edbcbd6bdaf6874dc69c806bb29e909bd733781fde8ac80ca3fff574d786ca903871d1e856e73fd58403bebb58c9f23083ea7cd749ba3e890af3d2
-
Filesize
13.5MB
MD5660708319a500f1865fa9d2fadfa712d
SHA1b2ae3aef17095ab26410e0f1792a379a4a2966f8
SHA256542c2e1064be8cd8393602f63b793e9d34eb81b1090a3c80623777f17fa25c6c
SHA51218f10a71dc0af70494554b400bdf09d43e1cb7e93f9c1e7470ee4c76cd46cb4fbf990354bbbd3b89c9b9bda38ad44868e1087fd75a7692ad889b14e7e1a20517
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
666B
MD5e49f0a8effa6380b4518a8064f6d240b
SHA1ba62ffe370e186b7f980922067ac68613521bd51
SHA2568dbd06e9585c5a16181256c9951dbc65621df66ceb22c8e3d2304477178bee13
SHA512de6281a43a97702dd749a1b24f4c65bed49a2e2963cabeeb2a309031ab601f5ec488f48059c03ec3001363d085e8d2f0f046501edf19fafe7508d27e596117d4