Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
11/04/2024, 01:50
Static task
static1
Behavioral task
behavioral1
Sample
c1cd53cb4c87e7ce7eafaaa9265198a07e90f8b4f05d1ab24ea49366abfad23f.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
c1cd53cb4c87e7ce7eafaaa9265198a07e90f8b4f05d1ab24ea49366abfad23f.exe
Resource
win11-20240221-en
General
-
Target
c1cd53cb4c87e7ce7eafaaa9265198a07e90f8b4f05d1ab24ea49366abfad23f.exe
-
Size
896KB
-
MD5
805a176bce5447129bd4bc07ef539cdd
-
SHA1
fc54ed71c6c30f0b39aeb42f08825636ae4b3e48
-
SHA256
c1cd53cb4c87e7ce7eafaaa9265198a07e90f8b4f05d1ab24ea49366abfad23f
-
SHA512
3ba7589350e07061f853f45cd91ce5383ba2a4c4bba787f04a44b7f56d88e3cde6641f80aa4cc0deaca6b2fbf4ff1995fa38c7d6d4d3fe941d163c530d20d053
-
SSDEEP
12288:SqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgarTM:SqDEvCTbMWu7rQYlBQcBiT6rprG8avM
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3884 msedge.exe 3884 msedge.exe 3360 msedge.exe 3360 msedge.exe 4876 msedge.exe 4876 msedge.exe 3324 msedge.exe 3324 msedge.exe 1204 identity_helper.exe 1204 identity_helper.exe 4108 msedge.exe 4108 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 3672 c1cd53cb4c87e7ce7eafaaa9265198a07e90f8b4f05d1ab24ea49366abfad23f.exe 3672 c1cd53cb4c87e7ce7eafaaa9265198a07e90f8b4f05d1ab24ea49366abfad23f.exe 3672 c1cd53cb4c87e7ce7eafaaa9265198a07e90f8b4f05d1ab24ea49366abfad23f.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe -
Suspicious use of SendNotifyMessage 15 IoCs
pid Process 3672 c1cd53cb4c87e7ce7eafaaa9265198a07e90f8b4f05d1ab24ea49366abfad23f.exe 3672 c1cd53cb4c87e7ce7eafaaa9265198a07e90f8b4f05d1ab24ea49366abfad23f.exe 3672 c1cd53cb4c87e7ce7eafaaa9265198a07e90f8b4f05d1ab24ea49366abfad23f.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3672 wrote to memory of 4876 3672 c1cd53cb4c87e7ce7eafaaa9265198a07e90f8b4f05d1ab24ea49366abfad23f.exe 77 PID 3672 wrote to memory of 4876 3672 c1cd53cb4c87e7ce7eafaaa9265198a07e90f8b4f05d1ab24ea49366abfad23f.exe 77 PID 4876 wrote to memory of 4664 4876 msedge.exe 80 PID 4876 wrote to memory of 4664 4876 msedge.exe 80 PID 3672 wrote to memory of 4272 3672 c1cd53cb4c87e7ce7eafaaa9265198a07e90f8b4f05d1ab24ea49366abfad23f.exe 81 PID 3672 wrote to memory of 4272 3672 c1cd53cb4c87e7ce7eafaaa9265198a07e90f8b4f05d1ab24ea49366abfad23f.exe 81 PID 4272 wrote to memory of 1808 4272 msedge.exe 82 PID 4272 wrote to memory of 1808 4272 msedge.exe 82 PID 3672 wrote to memory of 1760 3672 c1cd53cb4c87e7ce7eafaaa9265198a07e90f8b4f05d1ab24ea49366abfad23f.exe 83 PID 3672 wrote to memory of 1760 3672 c1cd53cb4c87e7ce7eafaaa9265198a07e90f8b4f05d1ab24ea49366abfad23f.exe 83 PID 1760 wrote to memory of 4188 1760 msedge.exe 84 PID 1760 wrote to memory of 4188 1760 msedge.exe 84 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 4956 4876 msedge.exe 85 PID 4876 wrote to memory of 3884 4876 msedge.exe 86 PID 4876 wrote to memory of 3884 4876 msedge.exe 86 PID 4876 wrote to memory of 836 4876 msedge.exe 87 PID 4876 wrote to memory of 836 4876 msedge.exe 87 PID 4876 wrote to memory of 836 4876 msedge.exe 87 PID 4876 wrote to memory of 836 4876 msedge.exe 87 PID 4876 wrote to memory of 836 4876 msedge.exe 87 PID 4876 wrote to memory of 836 4876 msedge.exe 87 PID 4876 wrote to memory of 836 4876 msedge.exe 87 PID 4876 wrote to memory of 836 4876 msedge.exe 87 PID 4876 wrote to memory of 836 4876 msedge.exe 87 PID 4876 wrote to memory of 836 4876 msedge.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1cd53cb4c87e7ce7eafaaa9265198a07e90f8b4f05d1ab24ea49366abfad23f.exe"C:\Users\Admin\AppData\Local\Temp\c1cd53cb4c87e7ce7eafaaa9265198a07e90f8b4f05d1ab24ea49366abfad23f.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa3e153cb8,0x7ffa3e153cc8,0x7ffa3e153cd83⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1804,7213071692751512749,10585458645356023467,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1868 /prefetch:23⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1804,7213071692751512749,10585458645356023467,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1804,7213071692751512749,10585458645356023467,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:83⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,7213071692751512749,10585458645356023467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:13⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,7213071692751512749,10585458645356023467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:13⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,7213071692751512749,10585458645356023467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3752 /prefetch:13⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,7213071692751512749,10585458645356023467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3704 /prefetch:13⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,7213071692751512749,10585458645356023467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:13⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,7213071692751512749,10585458645356023467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:13⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1804,7213071692751512749,10585458645356023467,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3428 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1804,7213071692751512749,10585458645356023467,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5668 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,7213071692751512749,10585458645356023467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:13⤵PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,7213071692751512749,10585458645356023467,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:13⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,7213071692751512749,10585458645356023467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:13⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,7213071692751512749,10585458645356023467,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:13⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1804,7213071692751512749,10585458645356023467,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5728 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4996
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/video2⤵
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa3e153cb8,0x7ffa3e153cc8,0x7ffa3e153cd83⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,18243678202179203648,16679550409633234369,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1820 /prefetch:23⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1912,18243678202179203648,16679550409633234369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3360
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/2⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa3e153cb8,0x7ffa3e153cc8,0x7ffa3e153cd83⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1452,16203570289182738313,6169016577621909787,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1988 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3324
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:764
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50e10a8550dceecf34b33a98b85d5fa0b
SHA1357ed761cbff74e7f3f75cd15074b4f7f3bcdce0
SHA2565694744f7e6c49068383af6569df880eed386f56062933708c8716f4221cac61
SHA512fe6815e41c7643ddb7755cc542d478814f47acea5339df0b5265d9969d02c59ece6fc61150c6c75de3f4f59b052bc2a4f58a14caa3675daeb67955b4dc416d3a
-
Filesize
152B
MD53b1e59e67b947d63336fe9c8a1a5cebc
SHA15dc7146555c05d8eb1c9680b1b5c98537dd19b91
SHA2567fccd8c81f41a2684315ad9c86ef0861ecf1f2bf5d13050f760f52aef9b4a263
SHA5122d9b8f574f7f669c109f7e0d9714b84798e07966341a0200baac01ed5939b611c7ff75bf1978fe06e37e813df277b092ba68051fae9ba997fd529962e2e5d7b0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize960B
MD56271bc824fc893fa67570395995dd431
SHA15613a845b954602a1481c487701ae1d2442227c5
SHA256aee56879945cc5eeed2245118793df5687375b398cd0d32bb0a8ba24918f2977
SHA5125e9c625cc294906d8d93bca0cd3dbf17124dc02a642e108ec627e5a50b45fd624988a894d534f88978be97516736efb4dbf55352ef89ad5c0d97e91629d04833
-
Filesize
2KB
MD5237da41250a7e11b7724abe2826ce78b
SHA110aa5b3f5564285c73514a41642ef871ba409242
SHA256f982f23dca5eed75be80f79ad354b85899313b88cf87a891072e4c919b0d9065
SHA5123125700ff55db2d121004416178ab215fba8cfe9cea1c8fd29d3e56f6a78b846cf4734939bea6302969f0d42562632209b8f29d655447e922f387dd0c4cab2fc
-
Filesize
2KB
MD580c3d6a62c9bf32f8308642d646de686
SHA1cdf2d5214e6491d02d8f8763b645356b9de75227
SHA256b1afa075851c173ba1922e87722ebaf503e0f8273746bc875db910f8f1c393a5
SHA512ea6bd43a086eff4b5323de30953a7b193a69e51da5217d43b3c0b916b1d4c76407e01345fb6ff66662f17a9ae812d33bdeffb523c4386cce0210e431e1737238
-
Filesize
5KB
MD55fc0b4381ec6e5c83698052a22a19f7d
SHA1f2ea923a12fa488ff03bcbcf07a1eb994dd541ca
SHA256122bda0479396258e242c336f2e27cf75257904aba04db0c44ac27aec0c3eb04
SHA5127fe8a59600ec62cc1f2758012a6820c927e229083846d9261fceb69d44b8c79c4bcf3d1d846aa8ad003d7a49f5bdf548156ba1608c23e5951043da7c65774093
-
Filesize
7KB
MD541e99597982d83a5bc64590654877c4b
SHA1173150b30ab1834834c3adc927269831635d63c9
SHA256ef74cd4edfee91084d787a61f058bbc7709037023fa9268151d40161bbf4b336
SHA512f383840f8d54fe567c742af7969efc0818bc73d9c8081daebfbdf88eac1cc58eb8ce15f531e352d5dbcc604691f3f53e9e2eac994c3b47beaf7fa3de5f86e501
-
Filesize
707B
MD54d6cf1353679e6e124bf76fc2adf4ebe
SHA17a3bfd9b12021d0bf3912c254d1b61e22605ccf5
SHA256b25bc643c3a875929e34a456b1f613e457c6d7daed066ca8444ebca123320763
SHA512d0ad45225628d0d242c67294d5b3eebec177435e17cd13e0d3e6a1d396f0c80115c8fbcd1660ebb19cf91d56ffc999aa599658380bc1fb864bf09d0179e8af41
-
Filesize
707B
MD552cf2966c491bfe8c92c1778403769fd
SHA1f395250edd3b188e87d0c845d28dc7ae770b0932
SHA25690b1763ecd3526da51af77c37a3997b14298dc0c193a4565a9b9893dc163cb09
SHA5126ff2fbbe3ecf765ebf2f3cb87c86be99e5d5c77ee6ed178e4781de6fe97f107bdadeb40890204e41c90f2f2e8169fadd49cf574782a81766de8a00adf2b36d22
-
Filesize
707B
MD581bd710e84edc40d836597137fd8ff37
SHA12637b3266779648c1631bcf59e5c45ca40877e6a
SHA2561324241f095ae683230788f9ba010973f01911a12b1ddbeb7f76b4515d0c1cb6
SHA512685786dad89b9524b3d706a3c80f4740b73a23f98f5dba34fb171357b201d9acac136ac0471a1c6cb28377d9b6d2ba5581c3bcf4a98cfa6a50980940eb2c4e6a
-
Filesize
707B
MD58b8bf27b2e3773f098bc83d61ac3c6a8
SHA1120619c229cc5cf1b184057454e0569e686d3b82
SHA256042512d8419dd6e6c6e080da6351b628ea499003938270b2f638f1e43933007a
SHA5121eaabf0612497957f873a75f0961a4dd15a5764a7afe11428dc7c847a126f90c901d4adef85997f3c2ab43ebb90f7c3239b1d655414383cdf3fbc15e09ab4b4f
-
Filesize
707B
MD594aae20735eec122ce7be60ac5821be4
SHA18574a4f68dd342c31495b6bfcb79d6ce4ed1fbc9
SHA25652500f34685a163b0535a53c26cb7f38b8577b9276dfcb06fa19022a9cad6f42
SHA51200f13a72ed432bc815cfa0da686a1e5de1daf664ff487d28ef40bb2cee018a34e59d40cdb9b6b8322a8261c749d90de9ba40f7e8575204cd5a3224a7f0c94cd2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD557e5a153063c61cf0cfad036f0033828
SHA1b2465be2d7dd8bba0ca20ecfe8029abb1479f629
SHA256bed4ac3dbe3cd39d78e2a9d3cde78d54295f2c541692f267d66d9aa824748aa0
SHA512a9bc4f850f07d4a0da46c43687abaacae0acbef58e8d9bf3ff07c24f1becac2b7122f5ecd0b54d1ee92bec67a0bc72a086a8b6090d342c7a97f677c5bc78ab70
-
Filesize
11KB
MD5965a930c7e720350bbdc4224c87b4297
SHA18bec404a1af065a83ca88c0089d574c27746d151
SHA256ed9bcece48d98ce3ab4f539a1c1995a321babf3c423b9a926c278f129d0d3ed5
SHA5122d140396c993c725ec81ed9c6f41af52142650fb73af60373d8446cf4178f88bd7245ec34134be58e7fca5647f947d4bbd5f88ff143d383ff94b26b4219939b8
-
Filesize
8KB
MD527907dcb9b7a3165e9ce685384a25950
SHA1ab3fe3c6d1340bd0560473350fa621206ee6b9d6
SHA2564ea607234ba34fbbc4d961dd2840f47f35414bec0849f1464b8b7c0fbd044f83
SHA512995128934872e0cc69daf7bc61088964848682239d737e4443fce660eaf87e5cb9db9c4d9f9af86c0de0e8eb6d6bfdb312e799c051b0c0117471aba754a0cea8