Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 14:40
Static task
static1
Behavioral task
behavioral1
Sample
1a3e2089a2ebc017bf4c8932f1f198f8b156102e5ec662dbd0bd7c0135cbf9fa.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
1a3e2089a2ebc017bf4c8932f1f198f8b156102e5ec662dbd0bd7c0135cbf9fa.exe
Resource
win11-20240412-en
General
-
Target
1a3e2089a2ebc017bf4c8932f1f198f8b156102e5ec662dbd0bd7c0135cbf9fa.exe
-
Size
896KB
-
MD5
64d71af9becf801cc05ddaf273538029
-
SHA1
0816d61b7507f62d2c5ed17197f857745d5d671b
-
SHA256
1a3e2089a2ebc017bf4c8932f1f198f8b156102e5ec662dbd0bd7c0135cbf9fa
-
SHA512
25e2ed48cf8dc0c2703d921b4219dab078ca713a2b052df01141d09fa87502e03de86360ee7464b0067a427ae7d19ff9ce761a83ec472fa029d8f50349587c3c
-
SSDEEP
12288:2qDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgapTS:2qDEvCTbMWu7rQYlBQcBiT6rprG8atS
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1604 msedge.exe 1604 msedge.exe 4240 msedge.exe 4240 msedge.exe 4692 msedge.exe 4692 msedge.exe 2988 msedge.exe 2988 msedge.exe 4108 identity_helper.exe 4108 identity_helper.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 3964 1a3e2089a2ebc017bf4c8932f1f198f8b156102e5ec662dbd0bd7c0135cbf9fa.exe 3964 1a3e2089a2ebc017bf4c8932f1f198f8b156102e5ec662dbd0bd7c0135cbf9fa.exe 3964 1a3e2089a2ebc017bf4c8932f1f198f8b156102e5ec662dbd0bd7c0135cbf9fa.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 3964 1a3e2089a2ebc017bf4c8932f1f198f8b156102e5ec662dbd0bd7c0135cbf9fa.exe 3964 1a3e2089a2ebc017bf4c8932f1f198f8b156102e5ec662dbd0bd7c0135cbf9fa.exe 3964 1a3e2089a2ebc017bf4c8932f1f198f8b156102e5ec662dbd0bd7c0135cbf9fa.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3964 wrote to memory of 2332 3964 1a3e2089a2ebc017bf4c8932f1f198f8b156102e5ec662dbd0bd7c0135cbf9fa.exe 85 PID 3964 wrote to memory of 2332 3964 1a3e2089a2ebc017bf4c8932f1f198f8b156102e5ec662dbd0bd7c0135cbf9fa.exe 85 PID 2332 wrote to memory of 4792 2332 msedge.exe 88 PID 2332 wrote to memory of 4792 2332 msedge.exe 88 PID 3964 wrote to memory of 4692 3964 1a3e2089a2ebc017bf4c8932f1f198f8b156102e5ec662dbd0bd7c0135cbf9fa.exe 89 PID 3964 wrote to memory of 4692 3964 1a3e2089a2ebc017bf4c8932f1f198f8b156102e5ec662dbd0bd7c0135cbf9fa.exe 89 PID 4692 wrote to memory of 4912 4692 msedge.exe 90 PID 4692 wrote to memory of 4912 4692 msedge.exe 90 PID 3964 wrote to memory of 4180 3964 1a3e2089a2ebc017bf4c8932f1f198f8b156102e5ec662dbd0bd7c0135cbf9fa.exe 91 PID 3964 wrote to memory of 4180 3964 1a3e2089a2ebc017bf4c8932f1f198f8b156102e5ec662dbd0bd7c0135cbf9fa.exe 91 PID 4180 wrote to memory of 2832 4180 msedge.exe 92 PID 4180 wrote to memory of 2832 4180 msedge.exe 92 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 4836 4692 msedge.exe 93 PID 4692 wrote to memory of 1604 4692 msedge.exe 94 PID 4692 wrote to memory of 1604 4692 msedge.exe 94 PID 2332 wrote to memory of 4340 2332 msedge.exe 95 PID 2332 wrote to memory of 4340 2332 msedge.exe 95 PID 2332 wrote to memory of 4340 2332 msedge.exe 95 PID 2332 wrote to memory of 4340 2332 msedge.exe 95 PID 2332 wrote to memory of 4340 2332 msedge.exe 95 PID 2332 wrote to memory of 4340 2332 msedge.exe 95 PID 2332 wrote to memory of 4340 2332 msedge.exe 95 PID 2332 wrote to memory of 4340 2332 msedge.exe 95 PID 2332 wrote to memory of 4340 2332 msedge.exe 95 PID 2332 wrote to memory of 4340 2332 msedge.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a3e2089a2ebc017bf4c8932f1f198f8b156102e5ec662dbd0bd7c0135cbf9fa.exe"C:\Users\Admin\AppData\Local\Temp\1a3e2089a2ebc017bf4c8932f1f198f8b156102e5ec662dbd0bd7c0135cbf9fa.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account2⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa21cb46f8,0x7ffa21cb4708,0x7ffa21cb47183⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,8799308489699599556,18103345496303697664,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:23⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,8799308489699599556,18103345496303697664,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4240
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/video2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd8,0x104,0x7ffa21cb46f8,0x7ffa21cb4708,0x7ffa21cb47183⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,398039675840117029,6029979350542601894,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:23⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,398039675840117029,6029979350542601894,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,398039675840117029,6029979350542601894,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:83⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,398039675840117029,6029979350542601894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:13⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,398039675840117029,6029979350542601894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:13⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,398039675840117029,6029979350542601894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3928 /prefetch:13⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,398039675840117029,6029979350542601894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:13⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,398039675840117029,6029979350542601894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:13⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,398039675840117029,6029979350542601894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:13⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,398039675840117029,6029979350542601894,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5640 /prefetch:83⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,398039675840117029,6029979350542601894,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5640 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,398039675840117029,6029979350542601894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5976 /prefetch:13⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,398039675840117029,6029979350542601894,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:13⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,398039675840117029,6029979350542601894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:13⤵PID:5208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,398039675840117029,6029979350542601894,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:13⤵PID:5216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,398039675840117029,6029979350542601894,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5304 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2164
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/2⤵
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa21cb46f8,0x7ffa21cb4708,0x7ffa21cb47183⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1448,17610437700028614605,15704303801121355430,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:23⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1448,17610437700028614605,15704303801121355430,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2988
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3096
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD548cff1baabb24706967de3b0d6869906
SHA1b0cd54f587cd4c88e60556347930cb76991e6734
SHA256f6b5fbc610a71b3914753feb2bd4475a7c77d0d785cc36255bf93b3fe3ccb775
SHA512fd0c848f3f9de81aca81af999262f96ea4c1cd1d1f32d304f56c7382f3b1bb604e5fbe9f209ad6e4b38988d92357ef82e9668806d0727f2856c7dc1f07aae2b6
-
Filesize
152B
MD57b56675b54840d86d49bde5a1ff8af6a
SHA1fe70a1b85f88d60f3ba9fc7bb5f81fc41e150811
SHA25686af7213f410df65d0937f4331f783160f30eaeb088e28a9eef461713b9a3929
SHA51211fc61b83365391efee8084de5c2af7e064f0182b943a0db08d95a0f450d3877bde5b5e6a6b9f008e58b709bb1a34f7b50085c41927f091df1eea78f039402e9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\285b3af4-2abb-4c18-9259-c1bc5b6fc098.tmp
Filesize7KB
MD5d1e06e52e25f6183a5829c3ceaa8720c
SHA1e1691bed452be19e75c78280c4396ea1288d4d7b
SHA256f83100a6705a829d9a034204b5c35baf96983de8488c11916ddfb31129fe87c2
SHA512021a48d1f7896ae67ee48cd5cea7f3903f9a5f9facbd4527969d3120dddbb4b9079dfad3d8bd2b510aae41835707cd2b15db45f2d3f8b76e425f7a78091c2fa9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize960B
MD5f3d356f5bf69590b954b738de10fed77
SHA1293d27fc5c1d212183fa2af548dd3c93779b19ee
SHA256d4cee9c9c6090e4ac29fdc0d5ec54f53e3bc6654f09c77cfdd04911020c06a95
SHA5129ca3e5ab5bf0b3d4b95d4e8d5476efd1606e17aebc33479dfdbc4c80af700334e0932d80be766d843d6f168d938bc1f78a2fd9d9d80a73e5ab03845ce3f252e9
-
Filesize
2KB
MD50b49e07a71808af188c8f2076b70f6fe
SHA1d5c6d7ceaa8dea113611a5740d90ee41965b2e83
SHA256ad7c03e4ec4664a2d45d49781d5bd92f128d096a710100873290fd2841c51646
SHA51233cb9eda9d750ab71be35954f180adbe55053051e332f2946b784d40fa4920ccdf7ef27543662ff40743ec7a19e6fed63e360215b9a6d85745de966842ec3ea4
-
Filesize
2KB
MD55bb21cdda46a2c4abb961a267722b615
SHA105e06c350ea3b226299c81a033bb50de689663fa
SHA2564d96e5609dc996ce070c151fb86419cbe467e26c11d16ee993a44ef0cc81509d
SHA512f46ca3cc64f70553116bdcce8320ece140575c46e7a3ba5366bd22816c3943303092a4c907c6f05648aaccb33d41a66c2e9207a67fd1b7f2a0b8f5fa39b6cb64
-
Filesize
6KB
MD56e876e84f5f5fee3ba8d24a6ec6bd1b3
SHA1090faa75ec8543d25ad894f0b1f2c216e7b77710
SHA256fe0e492c0642e3efc99209b181b6dece91ef345c339468c21929a853bf25ba57
SHA512791858670b115a99dc8d6fa660014f2c70e942a86f04019928f47951872147cf7b4c3d6fe2f9ccd7f24edadb3d408c3482a61dbe6abed844ab808ee7ec683ce4
-
Filesize
707B
MD51b526413b2f65f0da45f84fb762f2946
SHA19d7c02374233d61e43691488b8d3b6c6f8c9d146
SHA2565b464117e97109201518819201191fc47f9e2f6dac811267c80607d1082db9ce
SHA512ac618faf05e9bd4ff99f85b237f28b4bc8d2e8369651a3570520ee5c241a7268918ceee82c37d70d8b018261435144562b55aed2aea809ff2c44fe8a8e1a47b4
-
Filesize
707B
MD536a2d071712a9ddaa03f56737a8d5161
SHA1126c85611b815da7056a01785743411ce1957379
SHA256715b8e60a30a0f5d4ddfdc3a20c72fa0beee1f9c9e2ded6c990b6e9dfb24b79b
SHA5123762a3f492d7fc8e4ef3c0970dd3bac40ea6bde3e91cf34f4758b2b3f8267de3377f3e068ff67c323600a2a2a06d562913c2bbc2e8bfb170b5f8fd46278342cf
-
Filesize
707B
MD551c047578bc7dd0d78d256b8f602df04
SHA1f8bbd8c0f29bd6a2026581cbea48f63d561b89be
SHA25611ee26bc6e74d0259b37f3c3d84262a3db836fe8576930d4fa02dd7b6218f9b5
SHA5120b3843eed14685605c0f384076b7e0dfddadd3a922c12804b04c887d9458df11dba582dfa92e7bc870ea87607e0e5b3d7686ba320f8cd356099d0c755a1f79c1
-
Filesize
707B
MD5430758f518a774d9dd15d41085f9a9bd
SHA16a9ce4e6dedff922f53f559a3a328ed50669be78
SHA256d7ffe0f7e2c2e598fff5eb79f237a7b767930ace514ab5eb248f517276c472fc
SHA512da4f30623f61fdbcd292689183aec017fa24e42d15cad6babd9ba98cb227e242c18717a2a81a111156d374216f08dc17590177e5f352fedd4d150bc970fc1be8
-
Filesize
707B
MD5f9f0f6d879a37ed5878975bc367a6e13
SHA164d4f4e0befc844411b3ba169099b1eb021bd53b
SHA256bcf80ba56363b0c796cae82c655992012b1dd0ced5063276d8ee201211a640d3
SHA5128259cc301f1577bd82338fef52d9815f316c05121ec8d931ab6cd0d7b39a082c147eecb46fd8c0d1b488bf8ec4f52b5915b436ec9b2e89b562b6518d8488856d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5a87f551e4f24fd5e059d2bfdbc2b809c
SHA113ca35486542d16977b04f9a373d84a405a378d9
SHA25620e19381b5147f3db578ed353a4f661ee6f152fb24d765460159ed3685f946a8
SHA512c56e6dfee6be169986384308551a1f2314f052c1af0e9f6665c9e162994e3193eebc42ced9b5f1c8cc1ec816a69293921a5d2f002d30bf6a61aeebff8253e814
-
Filesize
8KB
MD57c4047405b8bd536f89e80607d67112c
SHA129491b7586ae85fd1a61573dddc5204f9548598a
SHA256f4b920fad44f04c5f8bd2ce9626d8ed3df16b6c84c8ed377fb61a805d3ca0f57
SHA512c1f2027d9483de5c9b7a06f36ec544c3af6bfe1fdc9502111b2036f1e5a252ce90d28e1b1255e6ef87b70c73e5c51caafe3c1a8b6729f34d4f0130acf713e954
-
Filesize
11KB
MD584068ed48452a24b723305ed588c961d
SHA1fc47599d673bcb26290545ab8de03ef2bd696b8b
SHA25623639546ed0b2c3f777777c32d3d0f5ede60fd6e924e96c71c92199f1744f69f
SHA51214c84c8e50a7741227b9f3b5ec9515c6b7cd3ccb0125f6002dd8ea1fe6de79a7ac3f40417e6508474b6d23da9bf9fce5d64bc51e95b95fe7868d380ccbf48618