Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
22-04-2024 13:23
Behavioral task
behavioral1
Sample
Trendy prezent z winem '24.pdf
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
email-html-2.html
Resource
win10v2004-20240412-en
General
-
Target
Trendy prezent z winem '24.pdf
-
Size
267KB
-
MD5
6879474480b159972da062820097ea4c
-
SHA1
52e3cb1e2a41d320c16282fd3d43579fedb43594
-
SHA256
560818df0e8728ed40cf21e3bcf87e84d77366c4f2746f8a5c4c56d3522f99b7
-
SHA512
8251c77393dc398478c9545e91fc664d2e17872a2edeb9572aed789dabb53fd1ddfb090b4d5e679fdb7845413c28d76293c3020e73f9458d086612c49dae13b8
-
SSDEEP
6144:IfmDzmZJ+5JQeztEZ31U3jRSP+Nvg9+9AFbaNj6:Ifm3mT+5qe83GRSPn9NFbaR6
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
msedge.exemsedge.exeAcroRd32.exeidentity_helper.exemsedge.exepid process 1896 msedge.exe 1896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 5692 identity_helper.exe 5692 identity_helper.exe 5616 msedge.exe 5616 msedge.exe 5616 msedge.exe 5616 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
AcroRd32.exemsedge.exepid process 4068 AcroRd32.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
AcroRd32.exepid process 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 4068 wrote to memory of 1384 4068 AcroRd32.exe RdrCEF.exe PID 4068 wrote to memory of 1384 4068 AcroRd32.exe RdrCEF.exe PID 4068 wrote to memory of 1384 4068 AcroRd32.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 232 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 5108 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 5108 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 5108 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 5108 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 5108 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 5108 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 5108 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 5108 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 5108 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 5108 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 5108 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 5108 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 5108 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 5108 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 5108 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 5108 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 5108 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 5108 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 5108 1384 RdrCEF.exe RdrCEF.exe PID 1384 wrote to memory of 5108 1384 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Trendy prezent z winem '24.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2531B0C61B4FB2E14B9505CABCCAF5D0 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:232
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=48DE353E92B14B379C9A43B1C3B58F27 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=48DE353E92B14B379C9A43B1C3B58F27 --renderer-client-id=2 --mojo-platform-channel-handle=1764 --allow-no-sandbox-job /prefetch:13⤵PID:5108
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E3246C553E47BEA7F8A0CF834783F771 --mojo-platform-channel-handle=2176 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2732
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=4D1422066EC1F71176F479F017F176D3 --mojo-platform-channel-handle=1948 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4304
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=21C39768E0E94292763D9E7FA81BD11D --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=21C39768E0E94292763D9E7FA81BD11D --renderer-client-id=6 --mojo-platform-channel-handle=1728 --allow-no-sandbox-job /prefetch:13⤵PID:1260
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=CF7712C70216B763391861CB47A55750 --mojo-platform-channel-handle=2684 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4216
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://kwasnewinogrona.pl/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4896 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8aa7446f8,0x7ff8aa744708,0x7ff8aa7447183⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,17232018183139857146,6919694351937169575,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:23⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1972,17232018183139857146,6919694351937169575,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2420 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1972,17232018183139857146,6919694351937169575,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:83⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,17232018183139857146,6919694351937169575,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:13⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,17232018183139857146,6919694351937169575,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:13⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,17232018183139857146,6919694351937169575,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:13⤵PID:5760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1972,17232018183139857146,6919694351937169575,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:83⤵PID:6092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1972,17232018183139857146,6919694351937169575,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,17232018183139857146,6919694351937169575,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:13⤵PID:5520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,17232018183139857146,6919694351937169575,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:13⤵PID:5524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,17232018183139857146,6919694351937169575,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:13⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,17232018183139857146,6919694351937169575,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:13⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,17232018183139857146,6919694351937169575,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4860 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5616
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
64KB
MD55f7efc5be8c11f748ca25beb7e6ad103
SHA1ead71e696b6f803b83b9b5e29a8e92630a759a7b
SHA256d167549707d94aea0c5f8adc38616363c89e445024a710e716dfc4225589ccc7
SHA512b0c8c420976d234dac24fabbd6fcc7af6c29f5e03ec0f3c2c82011479378be53312d4f013dc0776c75cbdf6ea4b1753bd6c8f0d16ada4756d9c0b293f09d44f4
-
Filesize
152B
MD5cb138796dbfb37877fcae3430bb1e2a7
SHA182bb82178c07530e42eca6caf3178d66527558bc
SHA25650c55ba7baeebe1fa4573118edbca59010d659ea42761148618fb3af8a1c9bdd
SHA512287471cccbe33e08015d6fc35e0bcdca0ec79bebc3a58f6a340b7747b5b2257b33651574bc83ed529aef2ba94be6e68968e59d2a8ef5f733dce9df6404ad7cc5
-
Filesize
152B
MD5a9519bc058003dbea34765176083739e
SHA1ef49b8790219eaddbdacb7fc97d3d05433b8575c
SHA256e034683bc434a09f5d0293cb786e6a3943b902614f9211d42bed47759164d38b
SHA512a1b67ccf313173c560ead25671c64de65e3e2599251926e33ce8399fde682fce5cb20f36ee330fcd8bb8f7a9c00ef432da56c9b02dfd7d3f02865f390c342b53
-
Filesize
201KB
MD5f5bc40498b73af1cc23f51ea60130601
SHA144de2c184cf4e0a2b9106756fc860df9ed584666
SHA256c11b6273f0c5f039dfef3bf5d8efe45a2ecf65966e89eeb1a6c2277d712ae9fb
SHA5129c993ef3ec746cbe937bbe32735410257f94ceb6f734d75e401fb78dc2e3ab3b7d83c086086f0e1230dc8dafd5328f9af664341eb781c72e67c4d84d1f6c1112
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5fb0ef7c3bbbb42f71303bf052a6cfb47
SHA191d8b9c402f4572fb4960f0bb8fc8e4743828421
SHA2564fd93cc7640246811744394643747ff6751ed105e0a271454a0b68cbdd7ee15f
SHA512762718b780b478c0a8f2700427926096da3aa6b969e800d9d4827284b0f060173a1b48921eb360612b4ec82eedf0b7194b5fc2423e3b72375c33e648df364d25
-
Filesize
1KB
MD5027b4c0385ca9b06b0061a175d55db93
SHA190c55b4ab6d4fdbd1c296ded7186a6a5483736e8
SHA2563ecf2ee11e7e088d0aba3b623ad430d2e36a15480c7e0f3f42811cd026cfc806
SHA512d4bf85d9e4210dbe8159fbb0d539dcdcff5adaf70e13676737847ac934cc3295f4fd74bb7be471afc09346198d6eab2467344974dc748640b2e9b317854dcfd7
-
Filesize
6KB
MD5c20a1c49ed2c7bab9ab9b5dfec66862f
SHA1c3036ff4fd0e063f9cff8eabc37ed0636eb8a30a
SHA2563e9013b863d5840893aef93b4824321375f67210bab85d2d09b548585c92f9d1
SHA512d37c15d61024694f0dee4cae73a49e83978c28dcd73bd732edec2127f41abf49af9bc773c51a2f4732c11830ca7a3ce4b6f1c973935366a9a0bbf566932bd235
-
Filesize
7KB
MD5531a1b5b3e704748addb7b034b15d42f
SHA1a915ca433f5df97170a063a7d8f660424893f893
SHA25612008c59df4080b5c5cfd2e28290490523303ef2876c8ad36a30c3b215684d89
SHA5123f70bdccf42cbee24519f2a114d2f7f85ab1b355101e0cc4177e47903a2d2ef306e0f13a93dda13f629bb43b1978ef6bb0679228bf720a396e8374dc8cd22956
-
Filesize
370B
MD5b1df0e8a098a0eb8835203cb61d8f91e
SHA1b317b0bf4467781a58c3a69b5d6f002e65c6eb62
SHA25605de6efeb5cee100d58787eb4e8f37925eb4fa33da33f09825bb2a539b69f3b4
SHA512bb8b3a8db58536111397f7d08341e63396cb1786f97067507a808adecbda0b190834658694cfa8154feb1a68473074515dc7ca08948cbd12fe16994cd0f237d1
-
Filesize
370B
MD5bb25e33df38216ebb699ce3fbea95801
SHA11a94c2ac0a73ceeb15a1e03b69c7161313f950e3
SHA2560a14c7815e805e920c3dac1d396e8ec103f83ca44b95adcd7aa6d71d79362051
SHA512bc83bf0d1ebd04e3bda1c7ac8125f54b9a0a451b87091fabb57bd09187badbc53492b2ff5a07b3fedf568d25ec464c565dcb5aceff6695c2f2ef101cf73700d2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53e9fc1702867980e6197b518bf9b3403
SHA1ef91a92869c179d003173b9a31e202578e059d0d
SHA256bd910bb23c5b7accce13866cc4f952f1c124361123488d49883d77a3967b8da7
SHA512f8444ed3a6276dd6cce7c67d8dc80b7c516dbb4d007ce056b3dc3b4996a7d8c36162f28ac1ca74e21fb8c75fe447c815d8ab9d5baeb53c6622bcea876232ac97
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e