Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1199s -
max time network
1176s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/04/2024, 17:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/REwxsl
Resource
win11-20240412-en
General
-
Target
https://gofile.io/d/REwxsl
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 536 obf.exe 2724 obf.exe -
Loads dropped DLL 49 IoCs
pid Process 536 obf.exe 536 obf.exe 536 obf.exe 536 obf.exe 536 obf.exe 536 obf.exe 536 obf.exe 536 obf.exe 536 obf.exe 536 obf.exe 536 obf.exe 536 obf.exe 536 obf.exe 536 obf.exe 536 obf.exe 536 obf.exe 536 obf.exe 536 obf.exe 536 obf.exe 536 obf.exe 536 obf.exe 536 obf.exe 536 obf.exe 536 obf.exe 536 obf.exe 2724 obf.exe 2724 obf.exe 2724 obf.exe 2724 obf.exe 2724 obf.exe 2724 obf.exe 2724 obf.exe 2724 obf.exe 2724 obf.exe 2724 obf.exe 2724 obf.exe 2724 obf.exe 2724 obf.exe 2724 obf.exe 2724 obf.exe 2724 obf.exe 2724 obf.exe 2724 obf.exe 2724 obf.exe 2724 obf.exe 2724 obf.exe 2724 obf.exe 2724 obf.exe 2724 obf.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 31 discord.com 35 discord.com 38 discord.com 40 discord.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-834482027-582050234-2368284635-1000_Classes\Local Settings msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Reaper_STABLE_V5.1.zip:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 840 msedge.exe 840 msedge.exe 3480 msedge.exe 3480 msedge.exe 2960 msedge.exe 2960 msedge.exe 4832 identity_helper.exe 4832 identity_helper.exe 3692 msedge.exe 3692 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
pid Process 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe -
Suspicious use of FindShellTrayWindow 45 IoCs
pid Process 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3480 wrote to memory of 1184 3480 msedge.exe 77 PID 3480 wrote to memory of 1184 3480 msedge.exe 77 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 3160 3480 msedge.exe 78 PID 3480 wrote to memory of 840 3480 msedge.exe 79 PID 3480 wrote to memory of 840 3480 msedge.exe 79 PID 3480 wrote to memory of 2812 3480 msedge.exe 80 PID 3480 wrote to memory of 2812 3480 msedge.exe 80 PID 3480 wrote to memory of 2812 3480 msedge.exe 80 PID 3480 wrote to memory of 2812 3480 msedge.exe 80 PID 3480 wrote to memory of 2812 3480 msedge.exe 80 PID 3480 wrote to memory of 2812 3480 msedge.exe 80 PID 3480 wrote to memory of 2812 3480 msedge.exe 80 PID 3480 wrote to memory of 2812 3480 msedge.exe 80 PID 3480 wrote to memory of 2812 3480 msedge.exe 80 PID 3480 wrote to memory of 2812 3480 msedge.exe 80 PID 3480 wrote to memory of 2812 3480 msedge.exe 80 PID 3480 wrote to memory of 2812 3480 msedge.exe 80 PID 3480 wrote to memory of 2812 3480 msedge.exe 80 PID 3480 wrote to memory of 2812 3480 msedge.exe 80 PID 3480 wrote to memory of 2812 3480 msedge.exe 80 PID 3480 wrote to memory of 2812 3480 msedge.exe 80 PID 3480 wrote to memory of 2812 3480 msedge.exe 80 PID 3480 wrote to memory of 2812 3480 msedge.exe 80 PID 3480 wrote to memory of 2812 3480 msedge.exe 80 PID 3480 wrote to memory of 2812 3480 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://gofile.io/d/REwxsl1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd8ecd3cb8,0x7ffd8ecd3cc8,0x7ffd8ecd3cd82⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1904,12382755591606133975,8342424247306307763,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1916 /prefetch:22⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1904,12382755591606133975,8342424247306307763,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1904,12382755591606133975,8342424247306307763,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,12382755591606133975,8342424247306307763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,12382755591606133975,8342424247306307763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,12382755591606133975,8342424247306307763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1904,12382755591606133975,8342424247306307763,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4840 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1904,12382755591606133975,8342424247306307763,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,12382755591606133975,8342424247306307763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,12382755591606133975,8342424247306307763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,12382755591606133975,8342424247306307763,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,12382755591606133975,8342424247306307763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,12382755591606133975,8342424247306307763,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,12382755591606133975,8342424247306307763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,12382755591606133975,8342424247306307763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1904,12382755591606133975,8342424247306307763,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1904,12382755591606133975,8342424247306307763,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=6428 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,12382755591606133975,8342424247306307763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,12382755591606133975,8342424247306307763,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2984 /prefetch:12⤵PID:240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,12382755591606133975,8342424247306307763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1904,12382755591606133975,8342424247306307763,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4952 /prefetch:82⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,12382755591606133975,8342424247306307763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2712 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,12382755591606133975,8342424247306307763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:1028
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1456
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3604
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2992
-
C:\Users\Admin\Downloads\Reaper_STABLE_V5.1\Reaper.exe"C:\Users\Admin\Downloads\Reaper_STABLE_V5.1\Reaper.exe"1⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\onefile_4152_133584544591908686\obf.exe"C:\Users\Admin\Downloads\Reaper_STABLE_V5.1\Reaper.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:536 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c3⤵PID:396
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4100
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c mode con: cols=150 lines=403⤵PID:4024
-
C:\Windows\system32\mode.commode con: cols=150 lines=404⤵PID:2044
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c title Reaper V5 [+] Authentication3⤵PID:2888
-
-
-
C:\Users\Admin\Downloads\Reaper_STABLE_V5.1\Reaper.exe"C:\Users\Admin\Downloads\Reaper_STABLE_V5.1\Reaper.exe"1⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\onefile_2972_133584545184048134\obf.exe"C:\Users\Admin\Downloads\Reaper_STABLE_V5.1\Reaper.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2724 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c3⤵PID:2036
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2272
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c mode con: cols=150 lines=403⤵PID:4264
-
C:\Windows\system32\mode.commode con: cols=150 lines=404⤵PID:1040
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c title Reaper V5 [+] Authentication3⤵PID:1572
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50fcda4fac8ec713700f95299a89bc126
SHA1576a818957f882dc0b892a29da15c4bb71b93455
SHA256f7a257742d3a6e6edd16ac8c4c4696d4bdf653041868329461444a0973e71430
SHA512ab350ca508c412ff860f82d25ac7492afb3baf4a2827249ebc7ec9632ee444f8f0716389f0623afc0756f395cf00d7a90a0f89b360acdf72b1befe34eecb5986
-
Filesize
152B
MD521986fa2280bae3957498a58adf62fc2
SHA1d01ad69975b7dc46eba6806783450f987fa2b48d
SHA256c91d76b0f27ccea28c4f5f872dee6a98f2d37424ef0b5f188af8c6757090cbb5
SHA512ae9ba1abe7def7f6924d486a58427f04a02af7dd82aa3a36c1ed527a23ec7897f00b0e30f22529e9599ae2db88e8abc7ba8013b426885aa3c961ee74678455f1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD58ba4f4c67531d26a7b57a8f07bac3f4d
SHA1f06cbaa22c04074175affad07a60678ea6359858
SHA256a10ea792985e03cb17b244572e80a6b546324b3d7a3b9108d96d3a32cd1c454c
SHA51297fb51d3b697b63b7d318a159999b5c675d20185b64591a04c544f15069c5d3eb09baa8dfefae8dfd086fb8309143a9b58fba8e6e3a5e7f103a5ffacbf51d114
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD5681d7776449697c6bc7dc2d3ee0bd219
SHA19063006439c5d4a09d0c93bc850664722588df19
SHA25644079e8e56c8f6f77b2ad30ef064d91ff138c4f975312611e2a5de60aac2223a
SHA51271a4b6d7e0f5b4c8d48e261ae19a964404c40a33a84023fb8d25ca9bb584d24789149649d43484841c40d1d031d4f4977f02fbeccbb6afa2269e083112912f5f
-
Filesize
856B
MD5679f05df60918b48011cba80541043c4
SHA185abd7b4e20c7cde9183144f38d91f7ec0b16e09
SHA256944cecd7fefce8bdd36663658ba21026f2c2802db4a7b885b19efa826122164f
SHA5126f3bd07425f7e04dcec974c777b10b086d7d8ee6ce79d0bf2447fdd0d39f8414e9ab4691a141807c1923c6cf9ff9aa701fad7e2bcc6f1d6408c318dfff05c3fb
-
Filesize
926B
MD50c90c274572332f654bfaf74901dcdf8
SHA13e048fa880a2544ca75653eddd235aed1331eeca
SHA2566894e2a812409dcc2220463ac391238ccb3360c84f6c7d449b4963412104a543
SHA512a3d233c02963d165bfd5dc8cc7465d70fbce788fd9b89880d6029df81648369fbd1ad4804ca4473310eb0e2196fc3cb15ec0e821c35cc72aa298e9c837e0f926
-
Filesize
6KB
MD50f8f8c2d30f8a07b05dce8f6643a130e
SHA1f2a1d2a03f5ef5ea51fe3fc688738d44dbcc213c
SHA256bda5f9f1f9bf8e6bfd4f42c409816e25780073ff9495dd0449ddeee589ff5f91
SHA5128301d3e27a5f14492ad831321d27982b996347de78b5b354341b8d990b1b4e0052740b88cb0359fef9ece218d4c665126b1ca40ce42e77b39c4810d1394851ec
-
Filesize
6KB
MD53a8c41b2e420064bfa9bec4759caaa09
SHA114379d19f7dca0a05633bd04e1819f2c4d7ff1ce
SHA256de64774142f8544fc8a3f3b0a4d26c7f84ef6a0b58c31bdcbf082ea8c1292881
SHA51242ce0bfb873ad603d4463fee990fd6a37f9ac681e4ef8858f2afe596930d87fa7ff81c1c1bcc454f6ee01da541a5341b3cf0ce2ddbdc978ef3a7486840b6a39c
-
Filesize
6KB
MD53a1bdced186bc9bda2679d226b0ca24e
SHA1567f5ae0300f1f86a8febf240fd1a4ee7f9cc61e
SHA2560d5a95f7ce23db988ab85dc4e73f904ef16584428bbda4b20dc8ba97d3e2bc4a
SHA5123749dd81c3714aa0862a1d3c5445e94753948d7c4157fd76c0e4f417a12489d1684d54792cd8f143a1bd9b061ef61f76b6e452d968103c8758a4f5d682339623
-
Filesize
6KB
MD5f9461a8d42d1cbd01ef5a705db973a4d
SHA1a01f026d56ee83dab1aa11bb52652779325147cd
SHA256dbc1050feb3fdd33c5209287cb14d7eb743cea7df3f1ad09152809426005a317
SHA512748d139b3af2ba38690b7317a086e7b30ed9f73b67e961d4aff8504ec8efc4245330e8ad086fe2371dd433ed5e5d960f70e1824a1135d15ee9296de72b969ded
-
Filesize
6KB
MD5e310f55d81166a74a01700afa85d7ec0
SHA19ca3950b999f2ed1518f925e24733af2bb8cd3d1
SHA2565d31cf823f0f76017e53e9aec6975619cf782ae0731f07279db073d1023a926d
SHA51206a73653f9f09dcc6fb03b26bb14e5dbc4ef21e7b6af89d644b455612ecae4e6aafcfc3cfea8038d855c5b298a93d4bb69685b45fa3557cd9f4ef7eb4f0e7190
-
Filesize
532B
MD5c5e835da0256b60f18380a984c02a917
SHA1072a37e88bf549dc489fb255e3a7f5e96f432725
SHA256a0930bafe6c5892b9be02c0e6548b586edf813150d5b3a7c76a1cf23db8783ba
SHA51244f55aaab27b581409f17ee3dcb967c0307cbaf71acba0977609108028bfc7cf5bb5b7764a5960ee6616e2dd8ea686b374036557f0a831a175763cf82611e851
-
Filesize
536B
MD5becbd6d08690b60508b85678f0612d1b
SHA1d2a37de416aa74a5c860a65d3b81ea47d54a0923
SHA256369661b30bcb3e5ddb8965967e46cab85492e6a92139a4ff7e4495e25aebc92d
SHA512b37b20f8f29b4dac43e4d83576039065b307d06f3ae47e9e58fcfd17a5bc218fdd20771b5b3d435f787fbcaa89faf137c37e0964842b2308c336b8faa1f72ddc
-
Filesize
203B
MD55c8c5a611303cb41c90392c0778a40f0
SHA14303d3a382fc8457c5ced7fc395c1122120ad6f5
SHA2567c4995f97960902c0cf8452c6edb03629d446f0ff97629d808d312a714a210ff
SHA5126c349dd51e5ae540a92f5de4648256553ba69cf3ef0798167fce7cd311a8d88117bd133aab6aeffcc71224b97accbe942c494642ce3d7ed09c3efb17ab0a325c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD560c9290262b1a15a378a2c46d6e8c067
SHA170819a4acac3e8fcfd75d5396c7ac1e78544fb16
SHA2569213871d2632fa3c7f73e5e36ca23fd1e660168d6ef22140c65253ce19691de5
SHA512d6ee2bb232afe29f0f8f2361a1c989266aa7ad65225fb8d770524798935b7cc557efda4150f833a2491682c1557125997957f7c3d61703c43bdacc288dc88f80
-
Filesize
12KB
MD5419671baf38e2a74e774961a1555a85a
SHA18ecc623ca3621411dd0e0c1d443f3db6a2eeb27b
SHA256b2740eb1a979fdb32a59300b8fee5b0711b0d22efbf1d9a0caad3fadd3ae80ee
SHA51285328ac78535733c6815b6ab8bf7077a1aca00d123c6d869c7ebdc3468bb1d8a37f9a0e38648865619125cc2d6482d4960cf0ec2a3b51002f0a76de8410a0462
-
Filesize
11KB
MD51cf13b900d08fe23d29626909eb61c5e
SHA1153fb2be1682d6b7a700fa328023536ab4b76239
SHA2566ff5bf5d35bf15a8cb5f3a6c5d1d81e1be96bd571b13dbfbaf7161f3f5018c97
SHA51280fbac8ddb3fbc9c0d9efec50cc3d575a359c9483b5f1f3d43fa3b9e7001b767e62d88db3c966d8657676eb40ffd4cf0e3f04b8b974d86a657332619948cbbe0
-
Filesize
576KB
MD501b946a2edc5cc166de018dbb754b69c
SHA1dbe09b7b9ab2d1a61ef63395111d2eb9b04f0a46
SHA25688f55d86b50b0a7e55e71ad2d8f7552146ba26e927230daf2e26ad3a971973c5
SHA51265dc3f32faf30e62dfdecb72775df870af4c3a32a0bf576ed1aaae4b16ac6897b62b19e01dc2bf46f46fbe3f475c061f79cbe987eda583fee1817070779860e5
-
Filesize
48KB
MD5bba9680bc310d8d25e97b12463196c92
SHA19a480c0cf9d377a4caedd4ea60e90fa79001f03a
SHA256e0b66601cc28ecb171c3d4b7ac690c667f47da6b6183bff80604c84c00d265ab
SHA5121575c786ac3324b17057255488da5f0bc13ad943ac9383656baf98db64d4ec6e453230de4cd26b535ce7e8b7d41a9f2d3f569a0eff5a84aeb1c2f9d6e3429739
-
Filesize
82KB
MD5a8a37ba5e81d967433809bf14d34e81d
SHA1e4d9265449950b5c5a665e8163f7dda2badd5c41
SHA25650e21ce62f8d9bab92f6a7e9b39a86406c32d2df18408bb52ffb3d245c644c7b
SHA512b50f4334acb54a6fba776fc77ca07de4940810da4378468b3ca6f35d69c45121ff17e1f9c236752686d2e269bd0b7bce31d16506d3896b9328671049857ed979
-
Filesize
77KB
MD5290dbf92268aebde8b9507b157bef602
SHA1bea7221d7abbbc48840b46a19049217b27d3d13a
SHA256e05c5342d55cb452e88e041061faba492d6dd9268a7f67614a8143540aca2bfe
SHA5129ae02b75e722a736b2d76cec9c456d20f341327f55245fa6c5f78200be47cc5885cb73dc3e42e302c6f251922ba7b997c6d032b12a4a988f39bc03719f21d1a5
-
Filesize
37KB
MD5d86a9d75380fab7640bb950aeb05e50e
SHA11c61aaf9022cd1f09a959f7b2a65fb1372d187d7
SHA25668fba9dd89bfad35f8fd657b9af22a8aebda31bffda35058a7f5ae376136e89b
SHA51218437e64061221be411a1587f634b4b8efa60e661dbc35fd96a6d0e7eff812752de0ada755c01f286efefc47fb5f2daf07953b4cfc4119121b6bee7756c88d0f
-
Filesize
65KB
MD50edc0f96b64523314788745fa2cc7ddd
SHA1555a0423ce66c8b0fa5eea45caac08b317d27d68
SHA256db5b421e09bf2985fbe4ef5cdf39fc16e2ff0bf88534e8ba86c6b8093da6413f
SHA512bb0074169e1bd05691e1e39c2e3c8c5fae3a68c04d851c70028452012bb9cb8d19e49cdff34efb72e962ed0a03d418dfbad34b7c9ad032105cf5acd311c1f713
-
Filesize
106KB
MD5870fea4e961e2fbd00110d3783e529be
SHA1a948e65c6f73d7da4ffde4e8533c098a00cc7311
SHA25676fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644
SHA5120b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88
-
Filesize
63KB
MD542b1b82a77f4179b66262475ba5a8332
SHA19f6c979e2c59e27cc1e7494fc1cc1b0536aa3c22
SHA2568ec1af6be27a49e3dc70075d0b5ef9255fad52cbbdab6a5072080085b4e45e89
SHA5122ee9fc9079714cb2ae2226c87c9c790b6f52b110667dbe0f1677eedb27335949b41df200daf7f67aa5c90db63e369b4904aac986c040706f8a3f542c44daf1d0
-
Filesize
732KB
MD50606e7d1af5d7420ea2f363a9b22e647
SHA1949e2661c8abf1f108e49ddc431892af5c4eb5ae
SHA25679e60cd8bfd29ad1f7d0bf7a1eec3d9abadfce90587438ea172034074bc174ee
SHA5120fbb16af2523f374c6057e2cb2397cd7ff7eee7e224372fd56a5feada58b0cebb992a9889865d3b971f960ca5f3bc37ff3017474b79ccc9b74aa4d341b7e06fc
-
Filesize
120KB
MD5496dcf8821ffc12f476878775999a8f3
SHA16b89b8fdd7cd610c08e28c3a14b34f751580cffd
SHA256b59e103f8ec6c1190ded21eef27bea01579220909c3968eeec37d46d2ed39e80
SHA51207118f44b83d58f333bc4b853e9be66dffb3f7db8e65e0226975297bf5794ebdaa2c7a51ef84971faf4d4233a68a6b5e9ac02e737d16c0ac19a6cf65fad9443f
-
Filesize
63KB
MD51c88b53c50b5f2bb687b554a2fc7685d
SHA1bfe6fdb8377498bbefcaad1e6b8805473a4ccbf3
SHA25619dd3b5ebb840885543974a4cb6c8ea4539d76e3672be0f390a3a82443391778
SHA512a312b11c85aaa325ab801c728397d5c7049b55fa00f24d30f32bf5cc0ad160678b40f354d9d5ec34384634950b5d6eda601e21934c929b4bc7f6ef50f16e3f59
-
Filesize
155KB
MD5bc07d7ac5fdc92db1e23395fde3420f2
SHA1e89479381beeba40992d8eb306850977d3b95806
SHA256ab822f7e846d4388b6f435d788a028942096ba1344297e0b7005c9d50814981b
SHA512b6105333bb15e65afea3cf976b3c2a8a4c0ebb09ce9a7898a94c41669e666ccfa7dc14106992502abf62f1deb057e926e1fd3368f2a2817bbf6845eada80803d
-
Filesize
49KB
MD58b3d764024c447853b2f362a4e06cfc6
SHA1a8fd99268cea18647bfa6592180186731bff6051
SHA256ca131fc4a8c77daff8cff1b7e743b564745f6d2b4f9bb371b1286eb383c0692e
SHA512720d58c3db8febd66e3bc372b7b0a409185e9722402ee49e038ade2141a70ec209b79cde7c4d67a90e5b3b35ed545b3400c8dbe73124299a266be2b036934e3e
-
Filesize
31KB
MD5e0cc8c12f0b289ea87c436403bc357c1
SHA1e342a4a600ef9358b3072041e66f66096fae4da4
SHA2569517689d7d97816dee9e6c01ffd35844a3af6cde3ff98f3a709d52157b1abe03
SHA5124d93f23db10e8640cd33e860241e7ea6a533daf64c36c4184844e6cca7b9f4bd41db007164a549e30f5aa9f983345318ff02d72815d51271f38c2e8750df4d77
-
Filesize
157KB
MD50a7eb5d67b14b983a38f82909472f380
SHA1596f94c4659a055d8c629bc21a719ce441d8b924
SHA2563bac94d8713a143095ef8e2f5d2b4a3765ebc530c8ca051080d415198cecf380
SHA5123b78fd4c03ee1b670e46822a7646e668fbaf1ef0f2d4cd53ccfcc4abc2399fcc74822f94e60af13b3cdcb522783c008096b0b265dc9588000b7a46c0ed5973e1
-
Filesize
3.3MB
MD580b72c24c74d59ae32ba2b0ea5e7dad2
SHA175f892e361619e51578b312605201571bfb67ff8
SHA256eb975c94e5f4292edd9a8207e356fe4ea0c66e802c1e9305323d37185f85ad6d
SHA51208014ee480b5646362c433b82393160edf9602e4654e12cd9b6d3c24e98c56b46add9bf447c2301a2b2e782f49c444cb8e37ee544f38330c944c87397bdd152a
-
Filesize
686KB
MD586f2d9cc8cc54bbb005b15cabf715e5d
SHA1396833cba6802cb83367f6313c6e3c67521c51ad
SHA256d98dd943517963fd0e790fde00965822aa4e4a48e8a479afad74abf14a300771
SHA5120013d487173b42e669a13752dc8a85b838c93524f976864d16ec0d9d7070d981d129577eda497d4fcf66fc6087366bd320cff92ead92ab79cfcaa946489ac6cb
-
Filesize
45KB
MD5b92f8efb672c383ab60b971b3c6c87de
SHA1acb671089a01d7f1db235719c52e6265da0f708f
SHA256b7376b5d729115a06b1cab60b251df3efc3051ebba31524ea82f0b8db5a49a72
SHA512680663d6c6cd7b9d63160c282f6d38724bd8b8144d15f430b28b417dda0222bfff7afefcb671e863d1b4002b154804b1c8af2d8a28fff11fa94972b207df081b
-
Filesize
48.9MB
MD584dd3542486b0e322ae7435aa00cd856
SHA1ab55174f0e7bc75f26aa95804de51709aade0a06
SHA2560901a60e6ef6bc4ff14f0fd3934b073fd4cd11352c664fea4fd18c34680780e7
SHA5125944ce4c667dcd97257030605afe5da74faece3b81a3bf8d5c65f5f73d8ac8f1cc5e5a87fbce0bc9718a5c1babfc7dc8f2a387d93243e38b8b78eed20cf876c6
-
Filesize
5.5MB
MD51fe47c83669491bf38a949253d7d960f
SHA1de5cc181c0e26cbcb31309fe00d9f2f5264d2b25
SHA2560a9f2c98f36ba8974a944127b5b7e90e638010e472f2eb6598fc55b1bda9e7ae
SHA51205cc6f00db128fbca02a14f60f86c049855f429013f65d91e14ea292d468bf9bfdeebc00ec2d54a9fb5715743a57ae3ab48a95037016240c02aabe4bfa1a2ff4
-
Filesize
29KB
MD54ac28414a1d101e94198ae0ac3bd1eb8
SHA1718fbf58ab92a2be2efdb84d26e4d37eb50ef825
SHA256b5d4d5b6da675376bd3b2824d9cda957b55fe3d8596d5675381922ef0e64a0f5
SHA5122ac15e6a178c69115065be9d52c60f8ad63c2a8749af0b43634fc56c20220afb9d2e71ebed76305d7b0dcf86895ed5cdfb7d744c3be49122286b63b5ebce20c2
-
Filesize
1.1MB
MD52ab7e66dff1893fea6f124971221a2a9
SHA13be5864bc4176c552282f9da5fbd70cc1593eb02
SHA256a5db7900ecd5ea5ab1c06a8f94b2885f00dd2e1adf34bcb50c8a71691a97804f
SHA512985480fffcc7e1a25c0070f44492744c3820334a35b9a72b9147898395ab60c7a73ea8bbc761de5cc3b6f8799d07a96c2880a7b56953249230b05dd59a1390ad
-
Filesize
513KB
MD5baf4db7977e04eca7e4151da57dc35d6
SHA180c70496375037ca084365e392d903dea962566c
SHA2561a2ec2389c1111d3992c788b58282aaf1fc877b665b195847faf58264bf9bc33
SHA5129b04f24ee61efa685c3af3e05000206384ec531a120209288f8fdc4fb1ec186c946fd59e9eb7381e9077bfbcfc7168b86a71c12d06529e70a7f30e44658a4950
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
17.4MB
MD5fdfea803d06fe98624a9029379d6a507
SHA18b6a25d54a171035ce6b5fa452fe74232877204f
SHA25652923102d35a85ab7a826ed37144e7438ed94af1a7bf7298510c3e1730354f45
SHA512f930f57ef387af373de3a8f00d1fe945aa61e7d65f5d7100a5d3c1c5fb7c64687b7f42e598979b7e17975823900efa87fdf4b7977790690204ec3f52d6601097