Analysis
-
max time kernel
491s -
max time network
510s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
13-04-2024 08:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/folder/xdQ2CDCK#i3feM8SWjoA9XvLZGJHuLw
Resource
win10v2004-20240412-en
Errors
General
-
Target
https://mega.nz/folder/xdQ2CDCK#i3feM8SWjoA9XvLZGJHuLw
Malware Config
Extracted
discordrat
-
discord_token
ODU5MTIyNTI5NzQyNjE4NjM1.Gd2TNx.k4_Wl6MAIrDVzPW95UrYQBEz4yKbJ7tOFjiQfg
-
server_id
1228604538785763368
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 3012 Wave.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 18 IoCs
flow ioc 51 discord.com 54 discord.com 110 discord.com 268 discord.com 98 discord.com 99 discord.com 111 discord.com 259 discord.com 267 discord.com 116 discord.com 121 discord.com 266 raw.githubusercontent.com 50 discord.com 100 discord.com 255 raw.githubusercontent.com 256 raw.githubusercontent.com 257 discord.com 258 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1380 chrome.exe 1380 chrome.exe 6000 chrome.exe 6000 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1380 chrome.exe 1380 chrome.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeDebugPrivilege 3012 Wave.exe Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeShutdownPrivilege 1380 chrome.exe Token: SeCreatePagefilePrivilege 1380 chrome.exe Token: SeShutdownPrivilege 1380 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe -
Suspicious use of SendNotifyMessage 56 IoCs
pid Process 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe 1380 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1380 wrote to memory of 2172 1380 chrome.exe 88 PID 1380 wrote to memory of 2172 1380 chrome.exe 88 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 4548 1380 chrome.exe 89 PID 1380 wrote to memory of 1976 1380 chrome.exe 90 PID 1380 wrote to memory of 1976 1380 chrome.exe 90 PID 1380 wrote to memory of 1032 1380 chrome.exe 91 PID 1380 wrote to memory of 1032 1380 chrome.exe 91 PID 1380 wrote to memory of 1032 1380 chrome.exe 91 PID 1380 wrote to memory of 1032 1380 chrome.exe 91 PID 1380 wrote to memory of 1032 1380 chrome.exe 91 PID 1380 wrote to memory of 1032 1380 chrome.exe 91 PID 1380 wrote to memory of 1032 1380 chrome.exe 91 PID 1380 wrote to memory of 1032 1380 chrome.exe 91 PID 1380 wrote to memory of 1032 1380 chrome.exe 91 PID 1380 wrote to memory of 1032 1380 chrome.exe 91 PID 1380 wrote to memory of 1032 1380 chrome.exe 91 PID 1380 wrote to memory of 1032 1380 chrome.exe 91 PID 1380 wrote to memory of 1032 1380 chrome.exe 91 PID 1380 wrote to memory of 1032 1380 chrome.exe 91 PID 1380 wrote to memory of 1032 1380 chrome.exe 91 PID 1380 wrote to memory of 1032 1380 chrome.exe 91 PID 1380 wrote to memory of 1032 1380 chrome.exe 91 PID 1380 wrote to memory of 1032 1380 chrome.exe 91 PID 1380 wrote to memory of 1032 1380 chrome.exe 91 PID 1380 wrote to memory of 1032 1380 chrome.exe 91 PID 1380 wrote to memory of 1032 1380 chrome.exe 91 PID 1380 wrote to memory of 1032 1380 chrome.exe 91 PID 1380 wrote to memory of 1032 1380 chrome.exe 91 PID 1380 wrote to memory of 1032 1380 chrome.exe 91 PID 1380 wrote to memory of 1032 1380 chrome.exe 91 PID 1380 wrote to memory of 1032 1380 chrome.exe 91 PID 1380 wrote to memory of 1032 1380 chrome.exe 91 PID 1380 wrote to memory of 1032 1380 chrome.exe 91 PID 1380 wrote to memory of 1032 1380 chrome.exe 91 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mega.nz/folder/xdQ2CDCK#i3feM8SWjoA9XvLZGJHuLw1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcf044ab58,0x7ffcf044ab68,0x7ffcf044ab782⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1864,i,3140863687330333896,2780739477726447590,131072 /prefetch:22⤵PID:4548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2092 --field-trial-handle=1864,i,3140863687330333896,2780739477726447590,131072 /prefetch:82⤵PID:1976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2244 --field-trial-handle=1864,i,3140863687330333896,2780739477726447590,131072 /prefetch:82⤵PID:1032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3024 --field-trial-handle=1864,i,3140863687330333896,2780739477726447590,131072 /prefetch:12⤵PID:3804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3032 --field-trial-handle=1864,i,3140863687330333896,2780739477726447590,131072 /prefetch:12⤵PID:3672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4212 --field-trial-handle=1864,i,3140863687330333896,2780739477726447590,131072 /prefetch:82⤵PID:3760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5000 --field-trial-handle=1864,i,3140863687330333896,2780739477726447590,131072 /prefetch:82⤵PID:1816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4612 --field-trial-handle=1864,i,3140863687330333896,2780739477726447590,131072 /prefetch:82⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5108 --field-trial-handle=1864,i,3140863687330333896,2780739477726447590,131072 /prefetch:82⤵PID:4396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5148 --field-trial-handle=1864,i,3140863687330333896,2780739477726447590,131072 /prefetch:82⤵PID:2036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5528 --field-trial-handle=1864,i,3140863687330333896,2780739477726447590,131072 /prefetch:82⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4516 --field-trial-handle=1864,i,3140863687330333896,2780739477726447590,131072 /prefetch:82⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5320 --field-trial-handle=1864,i,3140863687330333896,2780739477726447590,131072 /prefetch:82⤵PID:4368
-
-
C:\Users\Admin\Downloads\Wave.exe"C:\Users\Admin\Downloads\Wave.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3012 -
C:\Windows\SYSTEM32\SCHTASKS.exe"SCHTASKS.exe" /run /tn \Microsoft\Windows\DiskCleanup\SilentCleanup /I3⤵PID:5740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.pornhub.com/3⤵PID:3028
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4600 --field-trial-handle=1864,i,3140863687330333896,2780739477726447590,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6000
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2660
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4324,i,17229298512878960157,13441031190071685883,262144 --variations-seed-version --mojo-platform-channel-handle=5252 /prefetch:81⤵PID:3656
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2d0 0x4a41⤵PID:2624
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --field-trial-handle=4280,i,17229298512878960157,13441031190071685883,262144 --variations-seed-version --mojo-platform-channel-handle=5084 /prefetch:11⤵PID:4920
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4732,i,17229298512878960157,13441031190071685883,262144 --variations-seed-version --mojo-platform-channel-handle=1272 /prefetch:81⤵PID:1212
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --field-trial-handle=5640,i,17229298512878960157,13441031190071685883,262144 --variations-seed-version --mojo-platform-channel-handle=5664 /prefetch:11⤵PID:6040
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --field-trial-handle=5552,i,17229298512878960157,13441031190071685883,262144 --variations-seed-version --mojo-platform-channel-handle=5652 /prefetch:11⤵PID:5324
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --field-trial-handle=5396,i,17229298512878960157,13441031190071685883,262144 --variations-seed-version --mojo-platform-channel-handle=5876 /prefetch:11⤵PID:1196
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5952,i,17229298512878960157,13441031190071685883,262144 --variations-seed-version --mojo-platform-channel-handle=5980 /prefetch:81⤵PID:2684
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:3600 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=123.0.6312.106 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=123.0.2420.81 --initial-client-data=0x238,0x23c,0x240,0x234,0x25c,0x7ffcd8fb4e48,0x7ffcd8fb4e54,0x7ffcd8fb4e602⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2164,i,479033318844316459,17052226226993449112,262144 --variations-seed-version --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1864,i,479033318844316459,17052226226993449112,262144 --variations-seed-version --mojo-platform-channel-handle=3268 /prefetch:32⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2356,i,479033318844316459,17052226226993449112,262144 --variations-seed-version --mojo-platform-channel-handle=3372 /prefetch:82⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --pdf-upsell-enabled --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=4140,i,479033318844316459,17052226226993449112,262144 --variations-seed-version --mojo-platform-channel-handle=4572 /prefetch:12⤵PID:184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --no-appcompat-clear --field-trial-handle=4764,i,479033318844316459,17052226226993449112,262144 --variations-seed-version --mojo-platform-channel-handle=4600 /prefetch:82⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4880,i,479033318844316459,17052226226993449112,262144 --variations-seed-version --mojo-platform-channel-handle=5008 /prefetch:82⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --pdf-upsell-enabled --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4024,i,479033318844316459,17052226226993449112,262144 --variations-seed-version --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --pdf-upsell-enabled --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5224,i,479033318844316459,17052226226993449112,262144 --variations-seed-version --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:5584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --pdf-upsell-enabled --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=3248,i,479033318844316459,17052226226993449112,262144 --variations-seed-version --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:5940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5232,i,479033318844316459,17052226226993449112,262144 --variations-seed-version --mojo-platform-channel-handle=5744 /prefetch:82⤵PID:5868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4776,i,479033318844316459,17052226226993449112,262144 --variations-seed-version --mojo-platform-channel-handle=5768 /prefetch:82⤵PID:5504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3460,i,479033318844316459,17052226226993449112,262144 --variations-seed-version --mojo-platform-channel-handle=5800 /prefetch:82⤵PID:6052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\123.0.2420.81\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\123.0.2420.81\elevation_service.exe"1⤵PID:4656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5f90ac636cd679507433ab8e543c25de5
SHA13a8fe361c68f13c01b09453b8b359722df659b84
SHA2565b4c63b2790a8f63c12368f11215a4ffec30c142371a819a81180a32baeb2bce
SHA5127641a3610ad6516c9ecd0d5f4e5fa1893c7c60ca3ba8ae2e1b3b0cc3a72f7f9bef4c776a1f2fc52f366bd28a419ae3594a6576e886e79a20ebd98b55b2acc967
-
Filesize
72B
MD516ce7e62942ca555c211c166cb1520fe
SHA190a64cae745cb16dd3d57805273adacf02c9948d
SHA256f2ee706d54180c382b56f77330f1bbb5592130c2e031e5dd0fed1d9f1e27fb54
SHA512e352ffadb2c8e8739b727b687e4fe1af9b37397556275e4ebc5f033b5c1f44ecdb8167b1106ef74a6b745df05d095bf27efa01584ca54bb1a3c7c20b5fba5a3d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\File System\000\t\Paths\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD5acad9db749e9ddae79541b347a3f5f89
SHA1c355e090f682d706c4b96b3899c356126d814913
SHA25664519641856c86ad8673fc69854f347ac61a3c87f69d4dcbfef3dca16507261a
SHA5124d264cde80b5b151a3258a68469e007aad0530c2a853ebe1da507ef03d2c21fab8a77448438a0a76769cdc37c0bcd404a4b48bb9835e896e431586ccdcf43f87
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD5894b5fcdb2ebcc9eb49621cce00062a5
SHA11c2f0fdaa3d8e1efd41d7aa64ae716d3db807310
SHA2560249de011429d6e8527d146127060cc037400d24cd1ed035e2cc00c73c29e264
SHA512f04de1e1b3b302954db949c9b1b2576b46618ae69d5211b7f2817b803b582b375c79c0259a9a3c02682cc98dfaa28d8086f2217b9c4421bd8b9e78b6ecbc2fe3
-
Filesize
6KB
MD5f03c751eba8d6ffbb17154f2a3439d53
SHA1c2c015096cf41803fb6f1997381e23b762d9c16e
SHA25638e5e1a4bfa8415d1bcfad335aff7a913f7d9a75912770bae761252deb31005b
SHA512c116ba5e483cc9c4dd6901d6f0f680ccaf85ce1a8746a28f57867457222c0ad109d8b49430ccf9d5c7bafd3131490df7b149bf54248b0d5d162490fc9698ed94
-
Filesize
7KB
MD584b968d6396d85e3a1ce7a12cf0b8f5a
SHA1d747bed57b1d45c727d0c3f67b9593003b16dcca
SHA256ebfeca0b2a65305b4d01ec8f3a69601dad72d7908a0a705d1c015372470cc849
SHA512e0a04908275f595fb19af53c6b391a30fd581644f7a4a1e0c9f6c765818a776eeb6f7edfe89f09f953c1dab43de8eee23411a13357d074be99df6fd474c42e94
-
Filesize
6KB
MD5b56b8803a18337217170868f66ad1848
SHA17625a9395094d505e65da45d8fbf451ab162d688
SHA2569aee96e5a37a0f3e5511dd59512e2017132eb8e5ba18c105bbb1a9f82ec1a322
SHA512a849e30378e4d0e43981248fcdac70b76d5361896ff94ec242bb25e4cbd7d5e7176ccdebb251440e750b9e1c3f5c17ec21f155e719237816a3246a4e2c014cda
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5f566bb0346099531c72edf9eb3341153
SHA1d9c2019d757904a1a5f37e04dc75a10b07f65f09
SHA25678c03f3d90984a7925805fc6f4f7503a2e062727dfc4945469541b6ee6c80a7b
SHA512ef92a11aff5e0a9acfcbd0e94f8155312c03c21b78bd8daddc05808039be75cef9c68578ba8b1356930bf3416fa3184550b0a7fd9cbbbec4501c12993d257c64
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe584e88.TMP
Filesize48B
MD5b706762522901d864f5b602329be8dae
SHA1ee101464c40b796517e3efab38e2dbc99c7ec318
SHA25670c8ce38c57c68292d0e3bffefe0259c0218eaf8febb1702bb48c76eb09fa13c
SHA5123837e19eee3c00314c559f509f5bc730d4abadbf50ecf3d4b4239d7a858adf943fae25fdff8517627a13d35bf40d5f4e6b9cea3ac97984ec9e9b44be35a124a5
-
Filesize
250KB
MD586d3844a4964cfe4921de26ea6ec2bd6
SHA167b09183bd3a0430673de4eee8997ad3f5cb137f
SHA256b253025f785c0b22d909d919737178ee3c08d8e37c9dda1ad98dd737e259aca8
SHA5127723096d23b8bd8195d6b3983e54914cd42e67a0c0dce2d910e4ee35cecff9e62b67d86431f8b19d1b2682e31c36fb0637e39cbdce800c5e0e1c84a4f2fe53dd
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
11KB
MD5f096a431c7515eba5c130877e41e72ef
SHA1cb53ca2f542f681c3afbc4e22710533dea3bdff4
SHA25643217db8f17b3ec017bee41f838769d7ca950dcb54e5820cb08689a9cc217d77
SHA512da1b5fb8f4bf8fcbfe406549203cf7eb7ea5df5c57c6d92d4decda374dfd71259e75d57bebae74450a465ed82710dddc11e0fef9b6455dc81bc03891eabf01e5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\be353018-bb23-4f20-aa76-a6228c87268d.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
60KB
MD5472eb0c17bdcd9b281c8b1faea10da74
SHA1407c765b2f49f9b16a825a058a6d90a42612baad
SHA2561155e995097bfa284ae4e5b7f2fc81e63629ed87f7b84255eac99de3d7e29bcf
SHA51208cfe9f26dd59cc916a56cc7d364fb3a00a03093e3f9821d0773e161f8e422b81751740b4db4ee93fb63c096e8e56d024b0137aca8f65fa456dfa443ec3559b1
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5cf303c20679e7e12672e87154808df2c
SHA1d1cf8b74c8b7274b8f0ba98bdb02cb26381d4efe
SHA256247052a71057fb595a3d32d8bdd355bf24d18bbaaf8ce0d99ca6b08a9f304404
SHA512faabe70d29150f67b08ebfef9cdef54605536041362df2f0b1d4c963e0d133fc4b0dce0c9bf39979c1bafea736c1c290f3376b3042c48c5c13602b76049d0c23
-
C:\Users\Admin\AppData\Roaming\Microsoft\Speech\Files\UserLexicons\SP_FA591BE19D7B42C0B9D8C652701A57FE.dat
Filesize940B
MD548f47f3e2489f435b84777595e1eecf2
SHA11d84d635546c0134e68a780c1b36ca7e08531315
SHA256f26256a8a78f7c4465e2577acd18bc32e77cb6587dd0a1cfa48d641e1c057edc
SHA512b93b46c7bcf18ff9f6a5a4ce6dc1175db0a528b2e43741524872c00a79ddab6ac5a39b387e02b53c6b0630d8a362cd03c735f63d05a74854018ce7677191ad06
-
Filesize
78KB
MD5e1f3dcf198b6f4d191a19b7f4dea728a
SHA17c8c094c18fa29ae748d7079b3b45e96f33c5eab
SHA256e428b96c216e8e638a9ee6b53eacfb482a9d73f84bce33ac9e72e8d270c80fd2
SHA5123e0c0e7f6349c7d233c62535a641c6d401680b9a688a23f3d12e257a56e346eb2831ef05e88dfd6c4e5581640c8ebeb1d58a740e84c8209135b2f034c3ddd608