Overview
overview
10Static
static
10068428a4ac...26.exe
windows11-21h2-x64
80c4791a6b4...ea.elf
windows11-21h2-x64
30d9bd2ae2e...ea.exe
windows11-21h2-x64
70fa00d4f4f...70.dll
windows11-21h2-x64
110de02fec8...d1.bat
windows11-21h2-x64
81157191701...32.exe
windows11-21h2-x64
716e81343ec...a5.exe
windows11-21h2-x64
717691f0962...b7.elf
windows11-21h2-x64
317c24104e8...12.exe
windows11-21h2-x64
31816cd993d...28.exe
windows11-21h2-x64
71b8cda768b...8a.elf
windows11-21h2-x64
31df6acbc11...b7.elf
windows11-21h2-x64
31e7706ed04...b0.elf
windows11-21h2-x64
31f580428fa...2c.elf
windows11-21h2-x64
3257fc477b9...cc.elf
windows11-21h2-x64
3262a10ee37...50.elf
windows11-21h2-x64
3267909cf4a...e7.bat
windows11-21h2-x64
102796760675...13.elf
windows11-21h2-x64
327e181c699...8c.elf
windows11-21h2-x64
32b4b073178...74.elf
windows11-21h2-x64
32b5bf75c0a...35.exe
windows11-21h2-x64
72bac99f5be...ec.elf
windows11-21h2-x64
32cfeefaa13...50.elf
windows11-21h2-x64
32e48ee0fb3...66.exe
windows11-21h2-x64
102e4d872360...5b.exe
windows11-21h2-x64
1031b6a60839...1b.exe
windows11-21h2-x64
3320ccae2e9...0d.exe
windows11-21h2-x64
103476006a8f...16.apk
windows11-21h2-x64
33545082c16...2e.elf
windows11-21h2-x64
3377c3c3679...05.elf
windows11-21h2-x64
33c40413f93...f5.exe
windows11-21h2-x64
10cbe27936a3...8b.iso
windows11-21h2-x64
3Resubmissions
22-04-2024 22:02
240422-1xtwbagh68 1022-04-2024 19:25
240422-x42b7afa68 1019-04-2024 03:02
240419-djmthsfh8w 10Analysis
-
max time kernel
100s -
max time network
115s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
22-04-2024 19:25
Static task
static1
Behavioral task
behavioral1
Sample
068428a4acb65807251b3b4c0aee2101519fdaebf6db5376863da5add3471f26.exe
Resource
win11-20240412-en
Behavioral task
behavioral2
Sample
0c4791a6b47491a0c43cea0ba54357e391a3c8b23aa28025489bbe43bb9ea6ea.elf
Resource
win11-20240412-en
Behavioral task
behavioral3
Sample
0d9bd2ae2e4b023047b6c08684e9e5daae76e31cced4c3fdf4640136245f7eea.exe
Resource
win11-20240412-en
Behavioral task
behavioral4
Sample
0fa00d4f4f8e8449883aef7f0459a0fb754d57d55af2b41f5e445f867000fa70.dll
Resource
win11-20240412-en
Behavioral task
behavioral5
Sample
10de02fec8ac3edbf1398e6dd43ddec95a89e0499e1e865a7d9e5289fb2b31d1.bat
Resource
win11-20240412-en
Behavioral task
behavioral6
Sample
11571917015adbf3b5196509e1082c8d415f011cce88bd8b16e9d9c5a39ac432.exe
Resource
win11-20240412-en
Behavioral task
behavioral7
Sample
16e81343ecea6082d76bf1ab26818c3bf56929c92468fae8837c6384b62d05a5.exe
Resource
win11-20240412-en
Behavioral task
behavioral8
Sample
17691f0962027e7110f727ae997f8af5885dd783674d1db023d467ec478515b7.elf
Resource
win11-20240412-en
Behavioral task
behavioral9
Sample
17c24104e8e5350eeb7e2a162dec3f6a4d6c70f3f0849e6346fd383d998dcc12.exe
Resource
win11-20240412-en
Behavioral task
behavioral10
Sample
1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.exe
Resource
win11-20240412-en
Behavioral task
behavioral11
Sample
1b8cda768ba75d723b2b0b34cf955f7ec9469b4e33c6fde6494eefd60a139d8a.elf
Resource
win11-20240412-en
Behavioral task
behavioral12
Sample
1df6acbc1106e17265fde3ab54b2a83fa8f6f39656d7c55481b2dbd66f1114b7.elf
Resource
win11-20240412-en
Behavioral task
behavioral13
Sample
1e7706ed0492572474cd866f13778cc66c42b614b3d0b1d9af35727c051a50b0.elf
Resource
win11-20240412-en
Behavioral task
behavioral14
Sample
1f580428fa8afd15832fcd04f5d6832be9f7a7144ff17e19c89d2b07e7f51f2c.elf
Resource
win11-20240412-en
Behavioral task
behavioral15
Sample
257fc477b9684863e0822cbad3606d76c039be8dd51cdc13b73e74e93d7b04cc.elf
Resource
win11-20240412-en
Behavioral task
behavioral16
Sample
262a10ee377a4945ce30e115e2ab1bf9ff2fc0f35741bbb72e40f145de24bd50.elf
Resource
win11-20240412-en
Behavioral task
behavioral17
Sample
267909cf4a62955a35b0fe013afbfd62d7ae1a1eef6d7a24d7ce50db52d48ce7.bat
Resource
win11-20240412-en
Behavioral task
behavioral18
Sample
2796760675e5efbef0319f0285c2e1d07c11b038311c02e16c2407ba57c38413.elf
Resource
win11-20240412-en
Behavioral task
behavioral19
Sample
27e181c699f14c3e53cabc89941ac40917165cc4be34d2c7f9d6eca0e16b508c.elf
Resource
win11-20240412-en
Behavioral task
behavioral20
Sample
2b4b073178b573aa181fdc6e8063c778c90f76235d640c186b99278186509e74.elf
Resource
win11-20240412-en
Behavioral task
behavioral21
Sample
2b5bf75c0aede1169e7aa2b4c760b1852f34990d5b8ce27ca2fa21efa35e0635.exe
Resource
win11-20240412-en
Behavioral task
behavioral22
Sample
2bac99f5be34b649749a4ce8ab7c8103f9dce863cbc490f273c27297b2c465ec.elf
Resource
win11-20240412-en
Behavioral task
behavioral23
Sample
2cfeefaa133519defee56f4253c7c7f2396d784ed8e09d2212ab5bee6cf52b50.elf
Resource
win11-20240412-en
Behavioral task
behavioral24
Sample
2e48ee0fb3ddd63efeecd900a9d2bde365e2fe1fcbb3c43c882362ae935c5066.exe
Resource
win11-20240412-en
Behavioral task
behavioral25
Sample
2e4d8723602c5ffc6409dceb0cb4ced2e749e374a0fcd41fe92e0fd50f817c5b.exe
Resource
win11-20240412-en
Behavioral task
behavioral26
Sample
31b6a608393ad6cadd7eadf286795aef37260c9b99e837f1d7a1aa4e9a7f901b.exe
Resource
win11-20240412-en
Behavioral task
behavioral27
Sample
320ccae2e9ae546c56193c24cb12cc54f29a872c08856cc143294dd2cf8a170d.exe
Resource
win11-20240412-en
Behavioral task
behavioral28
Sample
3476006a8f64bfe72a8b04477f6005293b5854cfbc58bee2ea28e59b58f0e316.apk
Resource
win11-20240412-en
Behavioral task
behavioral29
Sample
3545082c16d0e05faad342c614b27793ab0ec940a174ab5162dce1787ea8472e.elf
Resource
win11-20240412-en
Behavioral task
behavioral30
Sample
377c3c3679e44acbc13388ca7ec69f2346b321aa42110fc6ee44a44c54d67105.elf
Resource
win11-20240412-en
Behavioral task
behavioral31
Sample
3c40413f9340d25dc7f2c4358583706b1eb19962cb74669bf8276597e871faf5.exe
Resource
win11-20240412-en
Behavioral task
behavioral32
Sample
cbe27936a3beb1902517906f7da1d6d3f6ef8d1a0eda5e033f4da436df7cd88b.iso
Resource
win11-20240412-en
General
-
Target
1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.exe
-
Size
1.7MB
-
MD5
74a37bb794ed287696eac4495ffae13f
-
SHA1
0097bc646687e8441db0079c3f85320be39e4a13
-
SHA256
1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228
-
SHA512
17770d69d3792f1663d58d2d5c1b1cbcac04ac9ef85c0416bb4f69ca3410b710953f384039999e8719a798bf4cd751226a2282affb7f959197eeccb782126950
-
SSDEEP
24576:s7FUDowAyrTVE3U5F/9GqKVKic6QL3E2vVsjECUAQT45deRV9RZ:sBuZrEUwzKIy029s4C1eH93
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.tmppid process 2872 1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.tmp -
Loads dropped DLL 1 IoCs
Processes:
1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.tmppid process 2872 1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
Processes:
1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.tmpdescription ioc process File created C:\Program Files (x86)\Setup\is-QC457.tmp 1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.tmp File opened for modification C:\Program Files (x86)\Setup\unins000.dat 1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.tmp File created C:\Program Files (x86)\Setup\unins000.dat 1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exepid process 4340 msedge.exe 4340 msedge.exe 1796 msedge.exe 1796 msedge.exe 2548 identity_helper.exe 2548 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 1796 msedge.exe 1796 msedge.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
Processes:
1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.tmpmsedge.exepid process 2872 1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.tmp 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
msedge.exepid process 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.exe1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.tmpmsedge.exedescription pid process target process PID 568 wrote to memory of 2872 568 1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.exe 1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.tmp PID 568 wrote to memory of 2872 568 1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.exe 1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.tmp PID 568 wrote to memory of 2872 568 1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.exe 1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.tmp PID 2872 wrote to memory of 1796 2872 1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.tmp msedge.exe PID 2872 wrote to memory of 1796 2872 1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.tmp msedge.exe PID 1796 wrote to memory of 4860 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4860 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4144 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4340 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 4340 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 3752 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 3752 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 3752 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 3752 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 3752 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 3752 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 3752 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 3752 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 3752 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 3752 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 3752 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 3752 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 3752 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 3752 1796 msedge.exe msedge.exe PID 1796 wrote to memory of 3752 1796 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.exe"C:\Users\Admin\AppData\Local\Temp\1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Users\Admin\AppData\Local\Temp\is-U2FQ0.tmp\1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.tmp"C:\Users\Admin\AppData\Local\Temp\is-U2FQ0.tmp\1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.tmp" /SL5="$4023A,922170,832512,C:\Users\Admin\AppData\Local\Temp\1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://yakfrogs.xyz/tracker/thank_you.php?trk=27783⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe71513cb8,0x7ffe71513cc8,0x7ffe71513cd84⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,6438943179277646255,9884472150948520217,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1924 /prefetch:24⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,6438943179277646255,9884472150948520217,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1900,6438943179277646255,9884472150948520217,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:84⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,6438943179277646255,9884472150948520217,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:14⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,6438943179277646255,9884472150948520217,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:14⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1900,6438943179277646255,9884472150948520217,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4844 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:2548
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1536
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1568
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\FindProtect.vbe"1⤵PID:4620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
Filesize
299B
MD55ae8478af8dd6eec7ad4edf162dd3df1
SHA155670b9fd39da59a9d7d0bb0aecb52324cbacc5a
SHA256fe42ac92eae3b2850370b73c3691ccf394c23ab6133de39f1697a6ebac4bedca
SHA512a5ed33ecec5eecf5437c14eba7c65c84b6f8b08a42df7f18c8123ee37f6743b0cf8116f4359efa82338b244b28938a6e0c8895fcd7f7563bf5777b7d8ee86296
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD56286932b5c04092be1485061dbf0c7ab
SHA17bc617139a688551f8d2a98a2dbef4d5f15eab5c
SHA256ee77b5ef8a00d7566b7451262350106365455e9c17e01611db93a3db86a6a378
SHA512a2b9b7e1effd8aa5b9686854a45b60162b01da82d824b673171eea871ab857a89fd9d281655336ae0875dfa61845d949b14da4045a894314465f15f1b0ddde28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1B1495DD322A24490E2BF2FAABAE1C61
Filesize192B
MD5668590516acde7aae4a4871cf6fa8258
SHA164f30bb55601aacccb314ae85a0e73882b078157
SHA256f7a2d934851b48eacc9f04755526df90545497bae6313c3ea83bafe4ad46eaf9
SHA512f76e81272b869febb5650732a5cf067c3dd4867d0c55a7708878807e5ea717423dcafcca6edd3d3166da33ba2f0e2cb49a2692c0b7c145dccef895a5b3829dab
-
Filesize
152B
MD521986fa2280bae3957498a58adf62fc2
SHA1d01ad69975b7dc46eba6806783450f987fa2b48d
SHA256c91d76b0f27ccea28c4f5f872dee6a98f2d37424ef0b5f188af8c6757090cbb5
SHA512ae9ba1abe7def7f6924d486a58427f04a02af7dd82aa3a36c1ed527a23ec7897f00b0e30f22529e9599ae2db88e8abc7ba8013b426885aa3c961ee74678455f1
-
Filesize
152B
MD50fcda4fac8ec713700f95299a89bc126
SHA1576a818957f882dc0b892a29da15c4bb71b93455
SHA256f7a257742d3a6e6edd16ac8c4c4696d4bdf653041868329461444a0973e71430
SHA512ab350ca508c412ff860f82d25ac7492afb3baf4a2827249ebc7ec9632ee444f8f0716389f0623afc0756f395cf00d7a90a0f89b360acdf72b1befe34eecb5986
-
Filesize
553B
MD52226848a36cab7e52c40efd12b768e35
SHA161772d741f0529cab5bf83437821b37eb267f254
SHA25674e4b084313827d1670be1d9433e4e50ef954abee71d68ce0e02d2aaf360f189
SHA51201ea1783b05cae5173037abb7b3e6e7779cf84fd80310c727cb753ea0c9ccfc80db0132e11476ebba2859848434581e169b84c78b8d821550083b23467441df8
-
Filesize
6KB
MD55d16212d46c32373ee129639518398d0
SHA11f9748753dae4e59611c08dd8e728475d2d6c1de
SHA2565cd8652014e2f2ea73a889770e447f6717ba5d9c4c6eac4f601bb85175acd2ff
SHA5121655e7ba5fd190565680c167919950af09e76355deff7231e8eb899249cce51deddf4aa98288e73085766c8fe5fd0a70c9ec4e1b1f1823f774c88d8cba985129
-
Filesize
6KB
MD5ef5049ff1f43d5a1b1529c3c83316ebc
SHA15f8f565ac69e1d315f823e70218b952bb3755073
SHA256f296acc6acf74a677e3b5da1c8c12064c0769c6539c6eb9c85aebcd1c3faa167
SHA512dd590036df3599c87617be22e736560918dc40de821d28af5987df5ddd9c27f81d2934498a65dca612bd6481f185b577b08c8cd9393d208eb32eca351e4cd5a9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD524d7450c5f70d81c1b22f7a0206e367b
SHA151f7e846931ff9243cc63003cda48221fdcd4141
SHA2564d49b02d94eff775a8c9ea365e047eedc93102b11440a7a86f77254dbc21de12
SHA512a34ab719c2e3356565ad6e9db28b53a93f718f4d153f9cf964ed5de9da71b040a699ef9f0521d488020649fe1c449ad63dd7dc1011dfdecefb2c002219ba522f
-
Filesize
232KB
MD555c310c0319260d798757557ab3bf636
SHA10892eb7ed31d8bb20a56c6835990749011a2d8de
SHA25654e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed
SHA512e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57
-
C:\Users\Admin\AppData\Local\Temp\is-U2FQ0.tmp\1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.tmp
Filesize3.1MB
MD529c7863663a6218935710a3f95f69e24
SHA1f432dfcf453817fd00c16c035b16be778074e29b
SHA2568ab8594026e4bc39b73dd7ebefa28082ab9630efc2c2353357d24830534f0b16
SHA5127eb8f9b4f3ec2c7e06bddd74aab3d7a0e860465d34e8551ee728ee3e562d945acd0a06495567f6bccdc11d9e3b5b6f06a452528acacf4f73142caebfe3bcff94
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e