Resubmissions
08-06-2024 08:50
240608-krvyesae91 1008-05-2024 16:15
240508-tqnx6ach3w 1008-05-2024 16:07
240508-tkr3mafa54 1001-05-2024 18:02
240501-wmf49acg3s 627-04-2024 08:46
240427-kpfeysff8s 1025-04-2024 21:25
240425-z9y55afb7v 1025-04-2024 21:16
240425-z4pphafa97 1025-04-2024 18:27
240425-w3929sde33 1025-04-2024 18:17
240425-ww4a5sdc8x 10Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
25-04-2024 21:16
Static task
static1
Behavioral task
behavioral1
Sample
000.exe
Resource
win11-20240412-en
Behavioral task
behavioral2
Sample
Ana.exe
Resource
win11-20240412-en
Behavioral task
behavioral3
Sample
Bad Rabit.exe
Resource
win11-20240412-en
Behavioral task
behavioral4
Sample
Desktop Puzzle.exe
Resource
win11-20240412-en
Behavioral task
behavioral5
Sample
Memz.exe
Resource
win11-20240412-en
Behavioral task
behavioral6
Sample
NoEscape.exe
Resource
win11-20240412-en
Behavioral task
behavioral7
Sample
WannaCrypt0r.exe
Resource
win11-20240412-en
General
-
Target
Memz.exe
-
Size
14KB
-
MD5
19dbec50735b5f2a72d4199c4e184960
-
SHA1
6fed7732f7cb6f59743795b2ab154a3676f4c822
-
SHA256
a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d
-
SHA512
aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d
-
SSDEEP
192:sIvxdXSQeWSg9JJS/lcIEiwqZKBkDFR43xWTM3LHn8f26gyr6yfFCj3r:sMVSaSEglcIqq3agmLc+6gyWqFCj
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
Memz.exedescription ioc Process File opened for modification \??\PhysicalDrive0 Memz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
Processes:
explorer.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-801765966-3955847401-2235691403-1000_Classes\Local Settings explorer.exe -
Runs regedit.exe 2 IoCs
Processes:
regedit.exeregedit.exepid Process 2652 regedit.exe 484 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Memz.exeMemz.exeMemz.exeMemz.exeMemz.exepid Process 5008 Memz.exe 5008 Memz.exe 5008 Memz.exe 5008 Memz.exe 4160 Memz.exe 4160 Memz.exe 880 Memz.exe 880 Memz.exe 2984 Memz.exe 2984 Memz.exe 880 Memz.exe 4160 Memz.exe 4160 Memz.exe 880 Memz.exe 5008 Memz.exe 5008 Memz.exe 4128 Memz.exe 4128 Memz.exe 2984 Memz.exe 2984 Memz.exe 2984 Memz.exe 4128 Memz.exe 2984 Memz.exe 4128 Memz.exe 880 Memz.exe 880 Memz.exe 5008 Memz.exe 5008 Memz.exe 4160 Memz.exe 4160 Memz.exe 2984 Memz.exe 2984 Memz.exe 4160 Memz.exe 880 Memz.exe 4160 Memz.exe 880 Memz.exe 5008 Memz.exe 5008 Memz.exe 4128 Memz.exe 4128 Memz.exe 4160 Memz.exe 4160 Memz.exe 2984 Memz.exe 2984 Memz.exe 4128 Memz.exe 4128 Memz.exe 5008 Memz.exe 5008 Memz.exe 880 Memz.exe 880 Memz.exe 2984 Memz.exe 2984 Memz.exe 4160 Memz.exe 4160 Memz.exe 2984 Memz.exe 2984 Memz.exe 880 Memz.exe 880 Memz.exe 5008 Memz.exe 5008 Memz.exe 4128 Memz.exe 4128 Memz.exe 5008 Memz.exe 5008 Memz.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
Processes:
msedge.exepid Process 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
AUDIODG.EXEdescription pid Process Token: 33 1568 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1568 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid Process 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
msedge.exepid Process 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Memz.exeidentity_helper.exepid Process 2692 Memz.exe 1832 identity_helper.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Memz.exeMemz.exemsedge.exedescription pid Process procid_target PID 4908 wrote to memory of 5008 4908 Memz.exe 80 PID 4908 wrote to memory of 5008 4908 Memz.exe 80 PID 4908 wrote to memory of 5008 4908 Memz.exe 80 PID 4908 wrote to memory of 4160 4908 Memz.exe 81 PID 4908 wrote to memory of 4160 4908 Memz.exe 81 PID 4908 wrote to memory of 4160 4908 Memz.exe 81 PID 4908 wrote to memory of 2984 4908 Memz.exe 82 PID 4908 wrote to memory of 2984 4908 Memz.exe 82 PID 4908 wrote to memory of 2984 4908 Memz.exe 82 PID 4908 wrote to memory of 880 4908 Memz.exe 83 PID 4908 wrote to memory of 880 4908 Memz.exe 83 PID 4908 wrote to memory of 880 4908 Memz.exe 83 PID 4908 wrote to memory of 4128 4908 Memz.exe 84 PID 4908 wrote to memory of 4128 4908 Memz.exe 84 PID 4908 wrote to memory of 4128 4908 Memz.exe 84 PID 4908 wrote to memory of 2692 4908 Memz.exe 85 PID 4908 wrote to memory of 2692 4908 Memz.exe 85 PID 4908 wrote to memory of 2692 4908 Memz.exe 85 PID 2692 wrote to memory of 4652 2692 Memz.exe 88 PID 2692 wrote to memory of 4652 2692 Memz.exe 88 PID 2692 wrote to memory of 4652 2692 Memz.exe 88 PID 2692 wrote to memory of 1480 2692 Memz.exe 89 PID 2692 wrote to memory of 1480 2692 Memz.exe 89 PID 2692 wrote to memory of 1480 2692 Memz.exe 89 PID 2692 wrote to memory of 2652 2692 Memz.exe 91 PID 2692 wrote to memory of 2652 2692 Memz.exe 91 PID 2692 wrote to memory of 2652 2692 Memz.exe 91 PID 2692 wrote to memory of 484 2692 Memz.exe 92 PID 2692 wrote to memory of 484 2692 Memz.exe 92 PID 2692 wrote to memory of 484 2692 Memz.exe 92 PID 2692 wrote to memory of 1888 2692 Memz.exe 93 PID 2692 wrote to memory of 1888 2692 Memz.exe 93 PID 1888 wrote to memory of 1420 1888 msedge.exe 94 PID 1888 wrote to memory of 1420 1888 msedge.exe 94 PID 1888 wrote to memory of 2788 1888 msedge.exe 95 PID 1888 wrote to memory of 2788 1888 msedge.exe 95 PID 1888 wrote to memory of 2788 1888 msedge.exe 95 PID 1888 wrote to memory of 2788 1888 msedge.exe 95 PID 1888 wrote to memory of 2788 1888 msedge.exe 95 PID 1888 wrote to memory of 2788 1888 msedge.exe 95 PID 1888 wrote to memory of 2788 1888 msedge.exe 95 PID 1888 wrote to memory of 2788 1888 msedge.exe 95 PID 1888 wrote to memory of 2788 1888 msedge.exe 95 PID 1888 wrote to memory of 2788 1888 msedge.exe 95 PID 1888 wrote to memory of 2788 1888 msedge.exe 95 PID 1888 wrote to memory of 2788 1888 msedge.exe 95 PID 1888 wrote to memory of 2788 1888 msedge.exe 95 PID 1888 wrote to memory of 2788 1888 msedge.exe 95 PID 1888 wrote to memory of 2788 1888 msedge.exe 95 PID 1888 wrote to memory of 2788 1888 msedge.exe 95 PID 1888 wrote to memory of 2788 1888 msedge.exe 95 PID 1888 wrote to memory of 2788 1888 msedge.exe 95 PID 1888 wrote to memory of 2788 1888 msedge.exe 95 PID 1888 wrote to memory of 2788 1888 msedge.exe 95 PID 1888 wrote to memory of 2788 1888 msedge.exe 95 PID 1888 wrote to memory of 2788 1888 msedge.exe 95 PID 1888 wrote to memory of 2788 1888 msedge.exe 95 PID 1888 wrote to memory of 2788 1888 msedge.exe 95 PID 1888 wrote to memory of 2788 1888 msedge.exe 95 PID 1888 wrote to memory of 2788 1888 msedge.exe 95 PID 1888 wrote to memory of 2788 1888 msedge.exe 95 PID 1888 wrote to memory of 2788 1888 msedge.exe 95 PID 1888 wrote to memory of 2788 1888 msedge.exe 95 PID 1888 wrote to memory of 2788 1888 msedge.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\Memz.exe"C:\Users\Admin\AppData\Local\Temp\Memz.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\Memz.exe"C:\Users\Admin\AppData\Local\Temp\Memz.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
C:\Users\Admin\AppData\Local\Temp\Memz.exe"C:\Users\Admin\AppData\Local\Temp\Memz.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4160
-
-
C:\Users\Admin\AppData\Local\Temp\Memz.exe"C:\Users\Admin\AppData\Local\Temp\Memz.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\Memz.exe"C:\Users\Admin\AppData\Local\Temp\Memz.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:880
-
-
C:\Users\Admin\AppData\Local\Temp\Memz.exe"C:\Users\Admin\AppData\Local\Temp\Memz.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4128
-
-
C:\Users\Admin\AppData\Local\Temp\Memz.exe"C:\Users\Admin\AppData\Local\Temp\Memz.exe" /main2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" \note.txt3⤵PID:4652
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe"3⤵
- Modifies registry class
PID:1480
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe"3⤵
- Runs regedit.exe
PID:2652
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe"3⤵
- Runs regedit.exe
PID:484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://play.clubpenguin.com/3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffdb7a53cb8,0x7ffdb7a53cc8,0x7ffdb7a53cd84⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1828,12553743766991082727,12560042473412480375,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1840 /prefetch:24⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1828,12553743766991082727,12560042473412480375,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:34⤵PID:788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1828,12553743766991082727,12560042473412480375,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2552 /prefetch:84⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,12553743766991082727,12560042473412480375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:14⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,12553743766991082727,12560042473412480375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:14⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,12553743766991082727,12560042473412480375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3768 /prefetch:14⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,12553743766991082727,12560042473412480375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:14⤵PID:276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,12553743766991082727,12560042473412480375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:14⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1828,12553743766991082727,12560042473412480375,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3488 /prefetch:84⤵PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1828,12553743766991082727,12560042473412480375,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 /prefetch:84⤵
- Suspicious use of SetWindowsHookEx
PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,12553743766991082727,12560042473412480375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:14⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,12553743766991082727,12560042473412480375,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:14⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,12553743766991082727,12560042473412480375,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:14⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,12553743766991082727,12560042473412480375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:14⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,12553743766991082727,12560042473412480375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:14⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,12553743766991082727,12560042473412480375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:14⤵PID:4532
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=g3t+r3kt3⤵PID:3088
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffdb7a53cb8,0x7ffdb7a53cc8,0x7ffdb7a53cd84⤵PID:1772
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4676
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5100
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004C8 0x00000000000004D41⤵
- Suspicious use of AdjustPrivilegeToken
PID:1568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD554caf18c2cda579e0dad6a9fc5179562
SHA1357d25de14903392900d034e37f5918b522e17c9
SHA25628d77529de92eb605d8afee0e133a7d08e13d4386e5e38d63e2da34623eaad6b
SHA51288da5a33df9d82408afb8344ec7dbaf7686435fdb55eccfb85d5560f39861e84cef5d71949d5efe7a191778e6be755a8448f3fc3d7043007037f9f5227e10210
-
Filesize
152B
MD5696ffba7b83ecf008523e96918f200d9
SHA1970d90e22c8b3674fc33cdd1913c51ef28514255
SHA256dc6dacd725d7385b2e4db1f488d93f2840d2289efdaaf3737849304d1ab9ba34
SHA512f8528683b70b58376f3eba3338fa6b462c9e9248c72524573005cff6397a0556bdcc2fdc2ebb020ba8218bc8174ba552002f223a245dfe3d3688826d24d63237
-
Filesize
200KB
MD5a484f2f3418f65b8214cbcd3e4a31057
SHA15c002c51b67db40f88b6895a5d5caa67608a65ce
SHA25679cbe928773386d07f0127f256f383debed5ccea5ff230465bf46ec7c87319d6
SHA5120be1bb8db08f6e6041a85cfee90cd36a5b595afbca34d52a125465454fc806b4bb7ae569eaf4c882922fb1b962b6060534e597791cd0ad23483be5981d9be85c
-
Filesize
5KB
MD5797cafbd8f217674da61aa89b1c3da33
SHA17c91336d1317a95261849d373bbb63564bda8127
SHA25631780cbcc76daaa8c0fbc7f1498cdc375d098c6277c738a0eee09e9fd7dbab03
SHA512135116609cc3cf885d5b6b6a6aa99b2482bad5927e3f33955c3e0a149b756c4833553e0855c3983d82d2e85656986f9d0666c5a4ac327d1096c451c7be595444
-
Filesize
5KB
MD5909fb14e353c380f113ee4abe11f27c1
SHA190b953478833e89e2e2cea2fa7365728eefee771
SHA256b94506bada5389dd1f1136c16df44c2a2902899db4254647a22dd5ff77810a25
SHA512d47ed81420d7c0e8a3afcc25b15f1d427dba6cfca10d0848e1ec855537a126aff58ca122e4b01ba2a91caa631f7e43b64d5d0ad0abe1dddd16b901652eadf9ae
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD579defd6992ba1df5791f373993c586a1
SHA16b6d7614c91120cf6e45038419a2c8f16364397e
SHA256d360694c01484d9b7931c3c706c84e1d39784b0137a0ceffd5406854f295cb28
SHA5128b3964894191c0a78f8eefbca976682d3a4743a55113bf695850b905e580d7872fa01b8615f39c0e9e522ab20668ab7788d32bcc8973aabf97bd804236f8d9cd
-
Filesize
218B
MD5afa6955439b8d516721231029fb9ca1b
SHA1087a043cc123c0c0df2ffadcf8e71e3ac86bbae9
SHA2568e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270
SHA5125da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e