Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
162s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28/04/2024, 10:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.cedinox.es/es/users/registro/index.html
Resource
win10v2004-20240419-en
General
-
Target
https://www.cedinox.es/es/users/registro/index.html
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133587742360657388" chrome.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2124 msedge.exe 2124 msedge.exe 2000 msedge.exe 2000 msedge.exe 4628 identity_helper.exe 4628 identity_helper.exe 5368 chrome.exe 5368 chrome.exe 6100 msedge.exe 6100 msedge.exe 6100 msedge.exe 6100 msedge.exe 6088 chrome.exe 6088 chrome.exe 6088 chrome.exe 6088 chrome.exe -
Suspicious behavior: LoadsDriver 10 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 656 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 21 IoCs
pid Process 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 2000 msedge.exe 2000 msedge.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 2000 msedge.exe 5368 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
pid Process 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2000 wrote to memory of 1804 2000 msedge.exe 85 PID 2000 wrote to memory of 1804 2000 msedge.exe 85 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 4300 2000 msedge.exe 86 PID 2000 wrote to memory of 2124 2000 msedge.exe 87 PID 2000 wrote to memory of 2124 2000 msedge.exe 87 PID 2000 wrote to memory of 1156 2000 msedge.exe 88 PID 2000 wrote to memory of 1156 2000 msedge.exe 88 PID 2000 wrote to memory of 1156 2000 msedge.exe 88 PID 2000 wrote to memory of 1156 2000 msedge.exe 88 PID 2000 wrote to memory of 1156 2000 msedge.exe 88 PID 2000 wrote to memory of 1156 2000 msedge.exe 88 PID 2000 wrote to memory of 1156 2000 msedge.exe 88 PID 2000 wrote to memory of 1156 2000 msedge.exe 88 PID 2000 wrote to memory of 1156 2000 msedge.exe 88 PID 2000 wrote to memory of 1156 2000 msedge.exe 88 PID 2000 wrote to memory of 1156 2000 msedge.exe 88 PID 2000 wrote to memory of 1156 2000 msedge.exe 88 PID 2000 wrote to memory of 1156 2000 msedge.exe 88 PID 2000 wrote to memory of 1156 2000 msedge.exe 88 PID 2000 wrote to memory of 1156 2000 msedge.exe 88 PID 2000 wrote to memory of 1156 2000 msedge.exe 88 PID 2000 wrote to memory of 1156 2000 msedge.exe 88 PID 2000 wrote to memory of 1156 2000 msedge.exe 88 PID 2000 wrote to memory of 1156 2000 msedge.exe 88 PID 2000 wrote to memory of 1156 2000 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.cedinox.es/es/users/registro/index.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff85f1746f8,0x7ff85f174708,0x7ff85f1747182⤵PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,7849222090172017691,18122945935302006388,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,7849222090172017691,18122945935302006388,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,7849222090172017691,18122945935302006388,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7849222090172017691,18122945935302006388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7849222090172017691,18122945935302006388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,7849222090172017691,18122945935302006388,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4848 /prefetch:82⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,7849222090172017691,18122945935302006388,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4848 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7849222090172017691,18122945935302006388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:12⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7849222090172017691,18122945935302006388,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7849222090172017691,18122945935302006388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7849222090172017691,18122945935302006388,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7849222090172017691,18122945935302006388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7849222090172017691,18122945935302006388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3644 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7849222090172017691,18122945935302006388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:12⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7849222090172017691,18122945935302006388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4500 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,7849222090172017691,18122945935302006388,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7849222090172017691,18122945935302006388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4560 /prefetch:12⤵PID:2884
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3308
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1128
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5368 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff84c50cc40,0x7ff84c50cc4c,0x7ff84c50cc582⤵PID:5452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2016,i,6402042912558808988,18150192861285444377,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2012 /prefetch:22⤵PID:5620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1864,i,6402042912558808988,18150192861285444377,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2096 /prefetch:32⤵PID:5628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2272,i,6402042912558808988,18150192861285444377,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2284 /prefetch:82⤵PID:5672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3136,i,6402042912558808988,18150192861285444377,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:5892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3164,i,6402042912558808988,18150192861285444377,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:5900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3772,i,6402042912558808988,18150192861285444377,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4564 /prefetch:12⤵PID:6072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4764,i,6402042912558808988,18150192861285444377,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4772 /prefetch:82⤵PID:5364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4452,i,6402042912558808988,18150192861285444377,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4440 /prefetch:12⤵PID:4024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4668,i,6402042912558808988,18150192861285444377,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4476 /prefetch:12⤵PID:3928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4888,i,6402042912558808988,18150192861285444377,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:3960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5384,i,6402042912558808988,18150192861285444377,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=3144,i,6402042912558808988,18150192861285444377,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5500,i,6402042912558808988,18150192861285444377,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:4176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=3808,i,6402042912558808988,18150192861285444377,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:5176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=3196,i,6402042912558808988,18150192861285444377,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5444 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:6088
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:5972
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5cb84c47e01c54e3fac81a6c56ea8df94
SHA19f1c5ed2de2301f38568800ef73ec21b09d96545
SHA256ef252fdece0417c1e8501d105b508136882644064e80b1209a17ca39f8b3924f
SHA5126377834f3641fef750a4fc0a401009769cb519859cae09eccc00b551ed921671a9511653ccb419b3c8d2ed9f8882c76093cd18b818d1e95dca707a8c30b48892
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD55da65bb50c4bb81e6544fadf83a1910b
SHA1b0cb29694c487e69319ba5319dd13e59fc2c86ce
SHA256155e63600e3e3ec4d9f6fb1e8fb2a8ee5856ba7e0b593a59ee2e0793aa1fc968
SHA51207457c10575714e8321eb01048ecac8fe1fa13d795b559b300d732120339fbf4b1afa537d73626067da6171004a9a54d8860c66b8cc32fb43e7043ceaf53039c
-
Filesize
9KB
MD574917472832f2ef62fe44e3d1f81fc28
SHA14b64a79fd8182bcabeda14ab1b2a391749409041
SHA25679ce1eb2205d16983dbdc4f5a0ad1fa194de6b2cb05841ff2f4bc1c083301675
SHA5120c5873c71db6694f522cad35ce3aba0b708b59179193e94501684513ac781ef03305e70e4e616ea561a052baef2b7028c3d5ad05f40c99a54113396db23c5621
-
Filesize
9KB
MD54a2d6af3caa704d3a25339a989a1eee8
SHA17030b24d3a03d25b840c0e571c52d6fed8080037
SHA256877318aee97de4b02fff1a76f59f62170c28c5691c7005e12a0711276aecc292
SHA512663300a8ab4b75b11a5e29438f8fa1ba740e5eee490844007dc4dcdf9e441e856417215fd5500dc02bf8e5ed07fc3ae72b350bbb031e8e2d9e0876577d7b735d
-
Filesize
9KB
MD590f057207abb42117200aa948b3c7e08
SHA15128c7715fed95c607f994fdcf5311b2e97fb264
SHA256e013d3aad893c953a1efada04c7b1016fa37d283049a11d166f87ceebe11ef0b
SHA512b82d5f783ef60f6dea1d22034e0c0a2eef866cc09c7e7fdabefd65e6caf3333b469373e1a961a159f4bbfe71c3c9a1d38605fe363710fb182ad5fedf0cbe4d63
-
Filesize
9KB
MD5845c921a50453f251d8fa09141926bf5
SHA10e63786fae720a5fa248a158bf3ca4668137566f
SHA256a0dc49dd68ae33b4b441f5b1323a04e7c4f965278af66d3c078da9905617ee5f
SHA512a6782da9fbcbb3e83e65b2ef183058ea172e5ef6f577b0f8afd094e8eb2c6eec1a1a31760dc449d84aacaadf0bbc7176a6ceadc8c0dc9fa2079514508efb4cba
-
Filesize
9KB
MD57f0581cd811bd602ba2b257bd6183a6c
SHA11a0ded6c30e5b5c2fa747aed060b7c202e1b2be9
SHA2567ff63b3addf47ed7c3348084e654991b8f7b85a5f3fc219234130ae828941b62
SHA5122431e1b536f1eea2f83dff427acd5a5e947b767a9703366b5be7bb0a74fe89ed4457c484c37457124a8ef8606e434b1eaec0f830a7f27302b0077941138c1542
-
Filesize
9KB
MD551864d5109f339c33e0a81ca6a062659
SHA158b356de032ac8ccd2f540733c904232af138e5b
SHA2561f3a95db8e572e2c186441d59fefad0d6005576b58e389e2bcec270668938a33
SHA5124f3769cb71f5f02f6e815ffb6181233b5eb41dc912f74f7499c0e5c3abcf950747b92f51251cc19394b74000cb93be635cd96d17677203090c0b17a54cf3ffef
-
Filesize
8KB
MD534c9134d3b81047a873fed446ec5e930
SHA15c1ac93ebc704a388cdfe5a5b09ac69f9784ea81
SHA256a094de7805d18f9bf6a709e01f02dcf42160e21f6d85e8f16b308ebd64f625d1
SHA51258d3f3d52e0069be4593e004eaeac17929f399b1b2af86b29371eda0b1443f139f22925c59d82c48dd1b4bd3ef0053cac3a3ec5f6eea1dda6ddb38dda3b51804
-
Filesize
9KB
MD56810eaafc33006e9a6b5b194cfaa37e6
SHA1137a89919b583bc9dae29e30cc59ec7185db8c63
SHA2569f4582e2bc6cc05eb80b8fb8a94215d957bc27c9b2dffdea82b6aa33669fb09c
SHA512f4fc1101bc31ae2b90363e99737ed704c372561f1084fb854074ded17efd06d21e653f817bd0c0a4d6fbe312f04aad3adeba1d8b9935a7193399140a1bea365a
-
Filesize
77KB
MD51fd813332dd8d38b51c63e659b113f97
SHA153b76374ba945fd496213fcc1f3380e21d562366
SHA256db9688b490728bc691e744e92bd3157d57e5b357c9f3931e47aa688205170dbc
SHA51243abecd8599362bcc16a81e0a6487c051c1ff9f351e49f45dcdafe3554caf48f5459f450c58d2572a6efaf5ba0bf7a3ff12e1093cce4e07c8b63952d6e2b61ad
-
Filesize
77KB
MD531e593188ec553f9660e20078bbaea50
SHA14d5394a8ede49a866bd3d4fcff2fd2d6873ac7ba
SHA25619bb1c22024c1ba120020a584a497f21ffcde9ae04453722fc6d00ad7137ddce
SHA512ed7ca0b77637cdff26330ee8f4575975c76cfb27af5a45aab977fef6a699d43af663961490710f36e22fb1f0a34c591533511eb5bcd7e97cd9333ee15350bc13
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
Filesize
6KB
MD5d23e229c173932eccd85a180b7e39d2a
SHA1d2ff4f639bf12197379f8fbd08a286ed9e15c8a6
SHA2565da471f4f6b83b8df536ca0e61708df9b1706cc029ea0c211178625a4798b9e9
SHA5121b9b90fad9276d171c2c6a483783339b768f9228d3c376182f784de90c603801e6db8224b2cc42e53913c364f9ee2a2cc02ac6c23e1d0b6c405715ab983ede93
-
Filesize
6KB
MD52c799ecac3041ce25b83004a8fc4dcf0
SHA1867a037fcc834553a6598330f6b79f72772036d7
SHA25618441cf8bc0384660afe9579f0101ba123ad83d6e4e8f258e0089fe45d28c20e
SHA512eccae673eb64f4c45421dbb729dae8b8e6efb1419d6e4268b60da55bd791962c32e68ae0e80df898145cdfa50c9f03d8188fc31b29ba582db51f8a9a8a34f9bd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5784e1a1657ce2e6656558702ecd0a14a
SHA169fc9a99afd29a954ab0acb67f59becdadf4044a
SHA2569032680331b6fe6ddea11e087c1c10d40d9d290535557321294668cac202b08c
SHA51208fb8545a1448f5dbece2f03e24e965b3a4016b07207535fe84b26756d71c2b1a0858a11a62b974052d0b091422d887c9d179cdc290d944b9149d2a0d966fbfd
-
Filesize
8KB
MD5784cb079fa4e8272a005ce951bbc6dd2
SHA1f8349eb722025b7bd77934c22c613721503bf6bb
SHA256889f961add8e5b02adaa472b6dfe2a0c97a809662ac40ba67198691553a24587
SHA5121bde5189715ccdf4bf080dd9c8fcfb3861bd6228cc54e7b849bf4bd10231024829c6d45612d5cde8d6a63754a1e433c9e1a03ba8c9d64b68ef6a8a3695635bb2