Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
28-04-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
392d2ae841b9dfa19736bb8faeac2a050b636724e27723a72b324e571f322969.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral2
Sample
392d2ae841b9dfa19736bb8faeac2a050b636724e27723a72b324e571f322969.exe
Resource
win11-20240419-en
General
-
Target
392d2ae841b9dfa19736bb8faeac2a050b636724e27723a72b324e571f322969.exe
-
Size
896KB
-
MD5
6c99bf8f7fdaa810ace7c41118307250
-
SHA1
e16b98c804f94785c767c540dac41c069b54b335
-
SHA256
392d2ae841b9dfa19736bb8faeac2a050b636724e27723a72b324e571f322969
-
SHA512
0aa117400dc0b182c688391fe4ec43e5174facf0c246293c50b6f02474f732674b51d7398861123750d28961f2ff43daf61e03b0102016c800a41fed339fe707
-
SSDEEP
12288:RqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgaLTB:RqDEvCTbMWu7rQYlBQcBiT6rprG8aPB
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4508 msedge.exe 4508 msedge.exe 4548 msedge.exe 4548 msedge.exe 716 msedge.exe 716 msedge.exe 3388 msedge.exe 3388 msedge.exe 3592 msedge.exe 3592 msedge.exe 3084 identity_helper.exe 3084 identity_helper.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 3608 392d2ae841b9dfa19736bb8faeac2a050b636724e27723a72b324e571f322969.exe 3608 392d2ae841b9dfa19736bb8faeac2a050b636724e27723a72b324e571f322969.exe 3608 392d2ae841b9dfa19736bb8faeac2a050b636724e27723a72b324e571f322969.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe -
Suspicious use of SendNotifyMessage 15 IoCs
pid Process 3608 392d2ae841b9dfa19736bb8faeac2a050b636724e27723a72b324e571f322969.exe 3608 392d2ae841b9dfa19736bb8faeac2a050b636724e27723a72b324e571f322969.exe 3608 392d2ae841b9dfa19736bb8faeac2a050b636724e27723a72b324e571f322969.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3608 wrote to memory of 4548 3608 392d2ae841b9dfa19736bb8faeac2a050b636724e27723a72b324e571f322969.exe 79 PID 3608 wrote to memory of 4548 3608 392d2ae841b9dfa19736bb8faeac2a050b636724e27723a72b324e571f322969.exe 79 PID 4548 wrote to memory of 2764 4548 msedge.exe 82 PID 4548 wrote to memory of 2764 4548 msedge.exe 82 PID 3608 wrote to memory of 2380 3608 392d2ae841b9dfa19736bb8faeac2a050b636724e27723a72b324e571f322969.exe 83 PID 3608 wrote to memory of 2380 3608 392d2ae841b9dfa19736bb8faeac2a050b636724e27723a72b324e571f322969.exe 83 PID 2380 wrote to memory of 2200 2380 msedge.exe 84 PID 2380 wrote to memory of 2200 2380 msedge.exe 84 PID 3608 wrote to memory of 2096 3608 392d2ae841b9dfa19736bb8faeac2a050b636724e27723a72b324e571f322969.exe 85 PID 3608 wrote to memory of 2096 3608 392d2ae841b9dfa19736bb8faeac2a050b636724e27723a72b324e571f322969.exe 85 PID 2096 wrote to memory of 2100 2096 msedge.exe 86 PID 2096 wrote to memory of 2100 2096 msedge.exe 86 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 2740 4548 msedge.exe 87 PID 4548 wrote to memory of 4508 4548 msedge.exe 88 PID 4548 wrote to memory of 4508 4548 msedge.exe 88 PID 4548 wrote to memory of 2648 4548 msedge.exe 89 PID 4548 wrote to memory of 2648 4548 msedge.exe 89 PID 4548 wrote to memory of 2648 4548 msedge.exe 89 PID 4548 wrote to memory of 2648 4548 msedge.exe 89 PID 4548 wrote to memory of 2648 4548 msedge.exe 89 PID 4548 wrote to memory of 2648 4548 msedge.exe 89 PID 4548 wrote to memory of 2648 4548 msedge.exe 89 PID 4548 wrote to memory of 2648 4548 msedge.exe 89 PID 4548 wrote to memory of 2648 4548 msedge.exe 89 PID 4548 wrote to memory of 2648 4548 msedge.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\392d2ae841b9dfa19736bb8faeac2a050b636724e27723a72b324e571f322969.exe"C:\Users\Admin\AppData\Local\Temp\392d2ae841b9dfa19736bb8faeac2a050b636724e27723a72b324e571f322969.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe68813cb8,0x7ffe68813cc8,0x7ffe68813cd83⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1832,11232741870052429407,14906875404808685141,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1856 /prefetch:23⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1832,11232741870052429407,14906875404808685141,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1832,11232741870052429407,14906875404808685141,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2564 /prefetch:83⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,11232741870052429407,14906875404808685141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:13⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,11232741870052429407,14906875404808685141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:13⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,11232741870052429407,14906875404808685141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3812 /prefetch:13⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,11232741870052429407,14906875404808685141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:13⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,11232741870052429407,14906875404808685141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:13⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,11232741870052429407,14906875404808685141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3876 /prefetch:13⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,11232741870052429407,14906875404808685141,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3916 /prefetch:13⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,11232741870052429407,14906875404808685141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:13⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,11232741870052429407,14906875404808685141,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:13⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1832,11232741870052429407,14906875404808685141,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1832,11232741870052429407,14906875404808685141,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,11232741870052429407,14906875404808685141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4300 /prefetch:13⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,11232741870052429407,14906875404808685141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:13⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1832,11232741870052429407,14906875404808685141,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4576 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,11232741870052429407,14906875404808685141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:13⤵PID:968
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/video2⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe68813cb8,0x7ffe68813cc8,0x7ffe68813cd83⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,17589560572624784368,12757076852950520831,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1908 /prefetch:23⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,17589560572624784368,12757076852950520831,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:716
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/2⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe68813cb8,0x7ffe68813cc8,0x7ffe68813cd83⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1944,12564926787009771901,12128332682847854065,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1952 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3388
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1040
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2928
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d0f84c55517d34a91f12cccf1d3af583
SHA152bd01e6ab1037d31106f8bf6e2552617c201cea
SHA2569a24c67c3ec89f5cf8810eba1fdefc7775044c71ed78a8eb51c8d2225ad1bc4c
SHA51294764fe7f6d8c182beec398fa8c3a1948d706ab63121b8c9f933eef50172c506a1fd015172b7b6bac898ecbfd33e00a4a0758b1c8f2f4534794c39f076cd6171
-
Filesize
152B
MD5ade01a8cdbbf61f66497f88012a684d1
SHA19ff2e8985d9a101a77c85b37c4ac9d4df2525a1f
SHA256f49e20af78caf0d737f6dbcfc5cc32701a35eb092b3f0ab24cf339604cb049b5
SHA512fa024bd58e63402b06503679a396b8b4b1bc67dc041d473785957f56f7d972317ec8560827c8008989d2754b90e23fc984a85ed7496f05cb4edc2d8000ae622b
-
Filesize
6KB
MD55d1db5e3324ce1dca94d95df4b1683db
SHA13935ea7caa80152f69a754f78aa14c18d30c8ed4
SHA256289a91ccb0ab56d6591019437ec1a80c4b866c07a3302c40c2fa824611e1edae
SHA512d30aaa012eae6ec7a74863e3fa1ef38dadc6980b10608316aa6724f4c2889bf53f6c92daafe9154b690dd014f8ed3b86bddd311634a22caeec3a50e8f502d1e9
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
8KB
MD5c8aafcdd8910c59366d46b9e01d1f9bc
SHA1529d194f8b65ca01d40f03c0accc0b843dc88b65
SHA256130628ed00b6e2b0e48337dbc259aca3e48d2a0d5a0e9d781ce6b8e8cbd557d3
SHA512ba68e9f4cf1d1762e2b464f40dbdffb7ecb1bb999892d3487c0e498d3cfdced78ec2745f368841fd2b033be4ce33f43cfa7543a720254c9262d6aff4ca1110b7
-
Filesize
8KB
MD57e63af2094f19fac5f2ecc8274e813f0
SHA14456deeaa5454a6562e3e3ff8cdcd49390fc7b80
SHA2565028169de0de4918e6eb191a6c821e426e97cd7bac401fab9ad2851a06b5a11b
SHA51284261a93a75d00c8779ed3bf8127d6764f56227007e6a567d58f10b06b04aa60272ecf340282abcb034661e52819203dc3de87d32368f47b6b9b4fa3320665cf
-
Filesize
8KB
MD567d3cac2eb58254a46bba7a8a32bec17
SHA139d29ed7bc33b7c403b48626cf408d9971be8680
SHA2561f531e0bbf6e9468750d23d392c94f67524b24c79cbbc1c8a10ef7b8a7a56395
SHA512eb57e778235e15be3f0966c8370e736a4139e964a88599f49ac1856274f9f6d91cd7a1ffea93ffbf9358899121f3673e5283bed116dad9f300c596bd5ba2ad82